**Author details**

Veeramreddy Jyothsna<sup>1</sup> \* and Koneti Munivara Prasad<sup>2</sup>

1 Sree Vidyanikethan Engineering College, Tirupati, India

2 Chadalawada Ramanamma Engineering College, Tirupati, India

\*Address all correspondence to: jyothsna1684@gmail.com

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**References**

361-337

2009

systems. Annales des

[1] Debar H, Dacier M, Wespi A. A revised taxonomy of intrusion-detection

*Anomaly-Based Intrusion Detection System DOI: http://dx.doi.org/10.5772/intechopen.82287*

> [9] Bhuyan MH, Bhattacharyya DK, Kalita JK. Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials.

[10] Wagh SK, Pachghare VK, Kolhe SR. Survey on intrusion detection system using machine learning techniques. International Journal of Computer Applications (0975–8887). 2013;**78**(16):

[11] Gilmore C, Haydaman J. Anomaly detection and machine learning methods for network intrusion detection: An industrially focused literature review. In: International Conference Security and Management;

[12] Pedro G-T. Anomaly-based network

[13] Patcha A, Park J-M. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks. 2007;**51**(12):

[14] Veeramreddy J, Vaddella RPV. Anomaly-based network intrusion detection through assessing feature association impact scale. International Journal of Information and Computer

Security. 2016;**8**(3):241-257

[15] Jyothsna V, Rama Prasad VV. FCAAIS: Anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express. 2016;**2**(3):

intrusion detection: Techniques, systems and challenges. Computers &

Security. 2009;**28**(1):18-28

2014;**16**(1):303-336

30-37

CSREA Press.

3448-3470

103-116

Telecommunications. 2000;**55**(7–8):

[2] Gong Y, Mabu S, Chen C, Wang Y, Hirasawa K. Intrusion detection system combining misuse detection and anomaly detection using genetic

network programming. In: ICCAS-SICE.

transportation users. IEEE International

Mobile Computing, Networking and

[4] Lee J, Moskovics S, Silacci L. A survey of intrusion detection analysis methods. CSE 221,

University of California, San Diego,

[6] Caulkins LTCBD, Lee J, Wang M. A dynamic data mining technique for intrusion detection systems. In: Proceedings of the 43rd Annual Southeast Regional Conference (ACM-SE 43). Vol. 2. 2005. pp. 148-153

[7] Tsai C-F et al. Intrusion detection by machine learning: A review. Expert Systems with Applications. 2009;

[8] Revathi S, Malathi DA. A detailed analysis on NSLKDD dataset using various machine learning techniques for intrusion detection. International Journal Engineering Research and Technology (IJERT). Dec 2013;**2**(12)

[5] Prayote A. Knowledge-based anomaly detection [PhD dissertation]. School of Computer Science and Engineering, The University of New

[3] Hall J, Barbeau M, Kranakis E. Anomaly-based intrusion detection using mobility profiles of public

Conference on Wireless and

Communications. 2005

Spring 1999

South Wales; 2007

**36**(10):11994-12000

**49**

*Anomaly-Based Intrusion Detection System DOI: http://dx.doi.org/10.5772/intechopen.82287*
