@article{Bartlett2009,
author = {Bartlett, Jason},
file = {::},
journal = {Network Security},
pages = {1--7},
title = {{Machine Learning for Network Intrusion Detection}},
url = {http://www.cs.colostate.edu/~anderson/cs545/assignments/solutionsGoodExamples/assignment8Bartlett.pdf},
year = {2009}
}
@article{Bolzoni2006,
author = {Bolzoni, D. and Etalle, S. and Hartel, P. and Zambon, E.},
doi = {10.1109/IWIA.2006.18},
file = {::},
isbn = {0-7695-2564-4},
journal = {Fourth IEEE International Workshop on Information Assurance (IWIA'06)},
pages = {144--156},
publisher = {Ieee},
title = {{POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1610007},
year = {2006}
}
@article{Datti2010,
author = {Datti, Rupali},
file = {::},
journal = {International Journal on Engineering Science and},
number = {04},
pages = {1072--1078},
title = {{Feature reduction for intrusion detection using Linear Discriminant Analysis}},
url = {http://www.doaj.org/doaj?func=abstract\&amp;id=693497},
volume = {02},
year = {2010}
}
@book{Davis2008,
address = {The University of Texas at Austin. Computer Science},
annote = {Information gain and Gain Ratio criteria with cost sensitivity.},
author = {Davis, Jason Victor},
isbn = {0549748474, 9780549748472},
pages = {245},
publisher = {ProQuest},
title = {{Mining statistical correlations with applications to software analysis}},
year = {2008}
}
@article{Depren2005,
author = {Depren, Ozgur and Topallar, Murat and Anarim, Emin and Ciliz, M. Kemal},
doi = {10.1016/j.eswa.2005.05.002},
file = {::},
issn = {09574174},
journal = {Expert Systems with Applications},
keywords = {48,anomaly detection,decision trees,hybrid intrusion detection,intrusion detection,j,kdd cup 99,misuse detection,som},
month = nov,
number = {4},
pages = {713--722},
title = {{An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0957417405000989},
volume = {29},
year = {2005}
}
@inproceedings{Deraman2011,
author = {Deraman, Maznan and {Jalil Desa}, A. and Othman, Z.A.},
booktitle = {Data Mining and Optimization (DMO), 2011 3rd Conference on},
file = {::},
isbn = {9781612842127},
keywords = {benchmark dataset,machine learning,network intrusion detection,repository},
number = {June},
pages = {51--56},
publisher = {IEEE},
title = {{Public domain datasets for optimizing network intrusion and machine learning approaches}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5976504},
year = {2011}
}
@article{Eskin1999,
author = {Eskin, Itamar},
file = {:F$\backslash$:/Projects/Edinburgh University/DME/papers/Multi-Class SVMs for Intrusion Detection.pdf:pdf},
journal = {System},
title = {{Multi-Class SVMs for Intrusion Detection}},
year = {1999}
}
@article{Hall1999,
author = {Hall, Mark A},
file = {::},
journal = {Methodology},
number = {April},
title = {{Correlation-based Feature Selection for Machine Learning}},
year = {1999}
}
@article{Jalil2010,
annote = {SVM vs Neural Networks vs DT
DT wins

        
Purpose of research: identify baseline algorithm for future research.

      },
author = {Jalil, KA and Kamarudin, MH},
file = {::},
isbn = {9781424475780},
journal = {Technology (ICNIT), 2010},
keywords = {-machine},
pages = {221--226},
title = {{Comparison of Machine Learning algorithms performance in detecting network intrusion}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5508526},
year = {2010}
}
@article{Jalil2010,
annote = {SVM vs Neural Networks vs DT
DT wins

        
Purpose of research: identify baseline algorithm for future research.

      },
author = {Jalil, KA and Kamarudin, MH},
file = {::},
isbn = {9781424475780},
journal = {Technology (ICNIT), 2010},
keywords = {-machine},
pages = {221--226},
title = {{Comparison of Machine Learning algorithms performance in detecting network intrusion}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5508526},
year = {2010}
}
@article{Kayack,
author = {Kayacık, H G\"{u}neş and Zincir-heywood, A Nur and Heywood, Malcolm I},
file = {:F$\backslash$:/Projects/Edinburgh University/DME/papers/Selecting Features for Intrusion Detection A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets.pdf:pdf},
journal = {Methodology},
keywords = {datasets,feature relevance,information gain,intrusion detection,kdd 99 intrusion detection},
title = {{Selecting Features for Intrusion Detection : A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets}}
}
@article{Kim,
author = {Kim, Wonil and Oh, Se-chang and Yoon, Kyoungro},
file = {:F$\backslash$:/Projects/Edinburgh University/DME/papers/Intrusion Detection Based on Feature Transfomr Using Neural Network.pdf:pdf},
journal = {Transformation},
pages = {212--219},
title = {{Intrusion Detection Based on Feature Transform Using Neural Network}}
}
@article{Lee1999,
author = {Lee, Wenke and Stolfo, SJ},
file = {::},
journal = {of the 1999 IEEE Symposium on},
title = {{A data mining framework for building intrusion detection models}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=766909},
year = {1999}
}
@article{Lippmann2000,
author = {Lippmann, RP and Fried, DJ and Graf, Isaac},
file = {::},
journal = {DARPA Information},
title = {{Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=821506},
year = {2000}
}
@inproceedings{Menon2009,
author = {Menon, Vikas and Pottenger, W.M.},
booktitle = {Intelligence and Security Informatics, 2009. ISI'09. IEEE International Conference on},
file = {::},
isbn = {9781424441730},
pages = {125--130},
publisher = {IEEE},
title = {{A Higher Order Collective Classifier for detecting and classifying network events}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5137283},
year = {2009}
}
@article{Mill2004,
author = {Mill, John},
file = {::},
isbn = {0780383532},
journal = {Fuzzy Systems, 2004. Proceedings. 2004},
pages = {407--410},
title = {{Support vector classifiers and network intrusion detection}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=1375759},
year = {2004}
}
@article{Sabhnani2003,
author = {Sabhnani, Maheshkumar},
file = {:C$\backslash$:/Users/PetkoN/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Sabhnani - 2003 - Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context.pdf:pdf},
journal = {Conference on Machine Learning: Models,},
keywords = {computer security,detection,false alarm rate,intrusion detection,kdd dataset,machine learning,misuse,probability of},
title = {{Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context}},
url = {http://neuro.bstu.by/ai/To-dom/My\_research/Papers-0/For-research/D-mining/Anomaly-D/KDD-cup-99/mlmta03.pdf},
year = {2003}
}
@article{Shirazi2009,
author = {Shirazi, Hossein M},
file = {:F$\backslash$:/Projects/Edinburgh University/DME/papers/Anomaly Intrusion Detection System.pdf:pdf},
journal = {Knowledge Creation Diffusion Utilization},
keywords = {features selection,intrus ion detection sys,k-m ea ns clus,k-nn,kdd99,tem,tering},
number = {3},
pages = {2581--2597},
title = {{Anomaly Intrusion Detection System Using Information Theory , K-NN and KMC Algorithms}},
volume = {3},
year = {2009}
}
@article{Sommer2010,
annote = {Examination of the inbalance between ML used for NID in research vs lack of deployment of solutions.

        
** Lack of success of ML.

      },
author = {Sommer, Robin and Paxson, Vern},
doi = {10.1109/SP.2010.25},
file = {::},
isbn = {978-1-4244-6894-2},
journal = {2010 IEEE Symposium on Security and Privacy},
keywords = {-anomaly detection,detection,intrusion,machine learning,network security},
pages = {305--316},
publisher = {Ieee},
title = {{Outside the Closed World: On Using Machine Learning for Network Intrusion Detection}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5504793},
year = {2010}
}
@article{Tsai2009,
author = {Tsai, Chih-Fong and Hsu, Yu-Feng and Lin, Chia-Ying and Lin, Wei-Yang},
doi = {10.1016/j.eswa.2009.05.029},
file = {::},
issn = {09574174},
journal = {Expert Systems with Applications},
month = dec,
number = {10},
pages = {11994--12000},
publisher = {Elsevier Ltd},
title = {{Intrusion detection by machine learning: A review}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S0957417409004801},
volume = {36},
year = {2009}
}
@article{Yang,
author = {Yang, Hongyu and Xie, Feng and Lu, Yi},
file = {:F$\backslash$:/Projects/Edinburgh University/DME/papers/Network Anomalous Attack Detection Based on.pdf:pdf},
journal = {Network},
pages = {672--682},
title = {{Network Anomalous Attack Detection Based on Clustering and Classifier}}
}
@article{Zhang2007,
author = {Zhang, Xue-qin and Gu, Chun-hua},
file = {::},
isbn = {142440973X},
journal = {Machine Learning},
keywords = {a subset of training,anomaly detection,classification decision boundary with,convex hull,known as support vectors,samples,support vector machine,these support vectors},
number = {August},
pages = {19--22},
title = {{Ch-svm based network anomaly detection}},
volume = {1},
year = {2007}
}
