Professional Documents
Culture Documents
1
Manish R. Joshi
School of Computer Sciences, North Maharashtra University,
Jalgaon (M.S ) India
joshmanish@gmail.com
Theyazn Hassn Hadi2
School of Computer Sciences, North Maharashtra University,
Jalgaon (M.S ) India
thhadi@nmu.ac.in
Abstract
Analysis and prediction of network traffic has applications in wide comprehensive set of areas and has newly
attracted significant number of studies. Different kinds of experiments are conducted and summarized to identify
various problems in existing computer network applications. Network traffic analysis and prediction is a proactive
approach to ensure secure, reliable and qualitative network communication. Various techniques are proposed and
experimented for analyzing network traffic including neural network based techniques to data mining techniques.
Similarly, various Linear and non-linear models are proposed for network traffic prediction. Several interesting
combinations of network analysis and prediction techniques are implemented to attain efficient and effective
results.
This paper presents a survey on various such network analysis and traffic prediction techniques. The uniqueness
and rules of previous studies are investigated. Moreover, various accomplished areas of analysis and prediction of
network traffic have been summed.
Keywords: Network traffic analysis, Network traffic Prediction, Time Series Model, Data Mining techniques, Neural
Network technique.
1. Introduction The predictability of network traffic is of important
Considering the fact that e-commerce, banking and benefits in many areas, such as dynamic bandwidth
business related highly confidential and valuable allocation, network security and network planning and
information communicated within the network, it is predictive congestion control and so on. We can identify
needless to mention the importance of network traffic two categories of predictions: long and short periods
analysis to attain proper information security. Network predictions. Traffic prediction for long period gives a
traffic analysis and prediction resembles a proactive detailed forecasting of traffic models to evaluate future
approach rather than reactive, where network is capacity requirements, and therefore permits for more
monitored to ensure that security breaches do not occur minute planning and better decisions. Short period
within network. The network traffic analysis is a prediction (milli-seconds to minutes) is linked to
significant stage for developing successful preventive dynamic resource allotment. It can be used to improve
congestion control schemes and to find out normal and Quality of Service (QoS) mechanisms as well as for
malicious packets. These schemes target to avoid congestion control and for optimal resource
network congestion by distributing the network management. It can also be used for routing packets.
resources with respect to the forecasted traffic. Several different techniques including time series
1
Network Traffic Analysis and Prediction
models, modern data mining techniques, soft computing 2.1. Data sets
approaches, and neural networks are used for network Testing and evaluating is an important of network
traffic analysis and prediction. This paper presents a traffic analysis. In order to evaluate the
review of several techniques proposed, used and effectiveness of all research works using similar
practiced for network traffic analysis and prediction. standard list is recommended to use standard data
The distinctiveness and restrictions of previous set. There are several standard data sets used
researches are discussed and typical features of these throughout the recent years. We enlist a few
network traffic analysis and prediction are also important data sets that are being used by
summarized. The remaining paper is organized as researchers for network traffic analysis.
follows. A short description about network traffic
analysis follows by an extensive review of several
available network analysis techniques in section two.
Section three reviews various network traffic prediction
techniques. In the last section, we give our conclusions.
Yogendra Kumar et Information NB and Bayes Net KDD cup For increase detection rate Accuracy, Recall,
al. 2011 entropy of intrusion detection Precision, F-
Measure
Khaled Al-Nafjan et PCA Modular neural KDD cup Reduce false positive rate RMSE
al. 2012 network of intrusion detection
Yingjie Zhou et al. Not Graph Mining Abilene data set Intrusion detection Accuracy
2009 mentioned
Xu Tian, Qiong Sun Feature selection Fast Decision Tree peer-peer Bit Stream network traffic Accuracy, DR
et al. 2008 Torrent, PP Live
Zhou Mingqiang et Not Local Deviation Massachusetts Intrusion detection Accuracy, DR
al. 2012 mentioned Coefficient Graph Institute of
Based Technology
dataset
Arya and Mishra et Feature selection J48, Random Tree, NLANR dataset Analysis internet traffic Precision, Recall,
al.2011 Random Forest and Accuracy
Boosting classifiers
Yacine Bouzida et PCA SVM and decision KDD cup Intrusion detection PSP
al. 2004 tree
Rupali Datti Not linear NSL-KDD For extracting feature from Accuracy
et al. 2010 mentioned discriminate data set for
analysis intrusion detection
Nikita Gupta et al. Rough set theory Rough set theory NSL-KDD Intrusion detection Accuracy,
2013 Sensitivity
Jashan Koshal et al Features selection Decision tree and KDD cup FP,FN,TP,TN
.2012 Support Vector Intrusion detection
Machine
Venkata Suneetha et Not Triangle area based Intrusion detection Accuracy, FP
al. 2005 mentioned on KNN and poly KDD cup
kernel SVM and K-
means
Srinivas Mukkamala SVM Support vector DARPA dataset Intrusion detection Accuracy
et al. 2010 machine and neural
network
Warusia Yassin et al. Not An integrated From server of Detection DDoS attack TP, TN, FP, FN
2013 mentioned machine learning K- ISCX
means clustering and
Nave Bayes classifier
Ming-Xiang He et. Rough set theory Neighborhood rough KDD cup Intrusion detection DR, FP
2013 and discretization set
method
G.kalyani et al. Feature selection Nave Bayes, J48, KDD cup Intrusion detection RAE, RMSE,
2012 Oner, PART and RBF RRSE, TP, FP
network algorithm
Jaspreet Kaur et al. Not Nave Bayes, RBF, Wireshark Intrusion detection Accuracy, Recall,
2012 mentioned MLP and Bayes Net software Precision
Zulaiha Ali et al. Discretization Fuzzy Apriori University Intrusion detection Accuracy, DR
2011 Kebangsaan
Malaysia (UKM)
He, Guangmin Hu et PAA,SAX Time series from Abilene For detection normal and Accuracy, DR
al. 2009 method association data (intenet-2 malicious packets
mining backbone
Network Traffic Analysis and Prediction
network) over
20 universities
servers
Weisong, Heisong Information Association rule from Abilene Minimize false positive and DR,FP
He et al. 2008 entropy mining (intenet-2 false negative
backbone
Rough set Neural Network with NSL-KDD Reduce dimensionality of DR,FP
Rowayda.Sadek et theory Indicator Variable data set for improve
al. 2009 using intrusion detection
Pooja et al.2013 Basic feature, Decision tree NSL-KDD For detecting DDoS attack Accuracy
traffic features
and content based
features
P Gifty et al. 2012 Correlation FLDA KDD cup For intrusion detection FP, Accuracy, DR
function
Nikkei C.anand et al. 2008 GARCH Abilene backbone internet To predict and capture MLE
the bursty nature of
Internet traffic
Edmund et al. 1993 Neural network Data set from B-ISDN. Reduce noise video MSER
traffic in term of
network traffic
prediction
Dong Churl et al.2009 D-BLRNN Bell core data set To improve the BRNN MSE
approach for network
traffic prediction
Samira Chabaa1 et al. 2010 MLP From backbone internet To predict the internet RMSEP
traffic over IP network
Wang Junsong et al. 2009 Elman Neural Network Simulation Long rang internet MSE,NMSE
traffic prediction
Samira Chabaa et al. 2009 ANFIS From backbone internet For modeling and RMSE,
over TCP/IP predicting internet AARE
traffic
Paulo Cortez et al. 2006 Neural Network Ensemble From internet service To predict error from MAPE
provider on based TCP/IP internet traffic
protocol
Wang Peng et al. 2008 BPWNN Collected network dataset Improving drawback of MSE
from real link BPNN technique in
network traffic
prediction
Hong Zhao 2009 LMK To predict self-similar LMS
network traffic
S.M.Aqil et al. 2007 ARIMA and GARCH University of Calgary To create conditional R-squared,
mean and conditional Adj.R-squared
variance model for log likelihood
prediction internet f-statistic mean
traffic dependent var
BoZhou et al. 2006 ARIMA/GARCH From University of To predict busty nature SER
Aucklands Internet uplink of network traffic
in different
Network Traffic Analysis and Prediction
Dehuai Zeng et al. 2008 ARIMA and MLANN Web server of Guangzhou To predict error from RMSE
network centre network traffic
G.Rutka 2008 Neural network and ARIMA Free stats and Fotoblog To predict short-range FPE,AIC
websites and long-rang self-
similar network traffic
Muhammad Faisal et al. 2012 ARIMA and ARMA From Caida, Auckland, Bell To predict error from NMSE
core data set network traffic
Chendi Feng et al. LNN and ENN To predict network NMSE,SER
traffic
Mohamed Faten et al. 2009 (-SNF), ARMA and Auckland, CESCA and To predict network RMSE
ARIMA Auckland traffic
LI Jing Fei et al. 2009 Wavelet and ARIMA models Shandong University To predict network MAPE
traffic
R.Sivakumar et al. 2011 HMM and NN CRAWDAD dataset To predict number of Transitivity,
wireless devices connect probability
to access point
Irina Klevecka et al. 2009 Neural network and ARIMA Telephone network as well To predict short-rang RMSE,MSE,MAPE
as packets switch IP network traffic
network
Cheng Guang Decomposed model backbone router of To predict long-rang AC
NSFNET network traffic
S. Gowrishankar FARIMA and neural network CRAWDAD website To forecast wireless MSE
network traffic for
improving quality of
service (QoS).
N. K. Hong et al. 2011 ARMA Collected data set by To predict FTP service MSE
using wire shack software in network traffic
Poo kuanHo et al. 2012 ARMA Collected 6 sets of real data To predict point-point MSE
at a period of six days from network application
bit Torrent P2PN (point to such as bit torrent
point network by using wire
shark software
Nayera Sadek et al. 2004 k-Factor Collected dataset from Predicting multi scale MAE
ARMA(autoregressive different real network data high speed network
moving average) like MPEG, VIDEO, JPEG, traffic by using different
INTERNT, and ETHERNT. dataset .
Yanhua Yu et et al. 2011 APM Certain mobile network of To predict mobile MAPE
Heilongjian province in network traffic
chain
Yanhua Yu et al. 2010 ARIMA Mobile network from To predict mobile MAPE
Heilongjiang chain network traffic
Yantai Shu et al. 2003 ARIMA GSM wireless mobile real To predict GMS MMSE
data from Tianjin at china wireless mobile network
mobile traffic
Bozidar vujic et al. 2006 SARIMA Public safety trunked radio To predict call from NMS
network radio network
Aqil Burney et al. 2009 SARIMA University of Karachi from To reduce noise which MAE, MSE
High speed Fiber optics happened in network
Local Area network with traffic
wireless computing
Huda M.A.El Hag et al. 2007 AARIMA Start ware MPEG and Bell For predicting long- MAE
core rang-dependant internet
traffic
Shen Fu-ke et al. 2009 EPTS ECNU data set Predict network traffic FPE
for managing bandwidth
11. M. He, D.D Qiu, A Intrusion Detection Method Based on
4. Conclusion Neighborhood Rough Set (TELKOMNIKA, 2013) Vol.
11, No. 7, pp. 3736 3741 e-ISSN: 2087-278X.
In the last decade, the analysis and prediction of 12. W. Junsong, W. Jiukun, Z. Maohua, W. Junjie,
network traffic has become a subject of continuous Prediction o f I nternet T raffic B ased o n Elman
research in various sub-fields of computer networks. Neural Network ( IEEE,2009) 978-1-4244-2722-2.
Innumerable number of researchers have been 13. H. M. A. El Hag, S. M. Sharif, An Adjusted ARIMA
implemented an effective network traffic algorithm for Model For Internet Traffic( IEEE, 2007) 978-1-4244-
the analysis and the prediction of network traffic. 0987-7.
In this paper, we surveyed the previous studies of 14. N. K. Hoong, P. K. Hoong, I. K.T. Tan, N.M
network traffic analysis. We enlisted and discussed Muthuvelu, L. C. Seng, Impact of Utilizing Forecasted
various approaches proposed to analyze and prediction Network Traffic for Data Transfers) IEEE, 211) 978-1-
of network traffic including data mining techniques, 4244-8830-8.
neural network and component analysis, and linear and 15. S.M.A Burney, S. Raza, Monte Carlo Simulation and
nonlinear time series models. The tabular arrangement Prediction of internet load using conditional mean and
of all the surveyed papers shall give an overview of the conditional variance model (ICCS-IX, 2007).
research work in the analysis and prediction of network 16. P.KuanHoong, I.K.T.Tan, C.YikKeong, BitTorrent
traffic. Network Traffic Forecasting With ARIMA (IJCNC,
Datasets used, implemented algorithms and metrics 2012) Vol.4, No.4.
used to evaluate the results are also used to group the 17. M.F Zhani, H. Elbiaze, Analysis and Prediction of Real
research works surveyed in the paper. Such a review Network Traffic (Journal of network, 2008) Vol. 4, No.
paper would provide an insight about the topic to the 9.
new researchers. 18. S Gowrishankar, A Time Series Modeling and prediction
of wireless Network Traffic ( Georgian Electronic
Scientific Journal: Computer Science and
References Telecommunications,2008) |No.2(16).
1. C Park, D-M Woo, Prediction of Network Traffic by
19. Y.Yu, M. Song, Z. Ren, l. Song, Network Traffic
Using Dynamic Bilinear Recurrent Neural Network
Analysis and Prediction Based on APM (IEEE, 2011)
)IEEE, 2009 ) 978-0-7695-3736-8.
978-1-4577-0208-2/11.
2. C . F Hai-liang, L. Q Chen, Multi-scale Internet Traffic
20. N.Sadek, A. Khotanzad, Multi-scale High Speed Network
Prediction Using Wavelet Neural Network Combined
Traffic Prediction Using K-Factor Gengendaue ARMA
Model( IEEE, 2009) 1-4244-0462-2.
Model (IEEE, 2004) 2148-2152.
3. C.Guang,G.Jian,D.Wei, A Time series Decomposed
21. D. Zeng, J. Xu1, J. Gu , L.Liu , G. Xu, Short Term Traffic
Model of Network Traffic(Springer, 2005) 338-345.
Flow Prediction Using Hybrid ARIMA and ANN model (
4. N.C Anand,C. ScoglioS, B. Natarajan, GARCH Non- IEEE, 2008) 978-0-7695-3342-1.
Linear Time Series Model for Traffic Modeling and
22. W. Peng1 ,L.Yuan, Network Traffic Prediction Based
Prediction ( IEEE, 2008) 978-1-4244-2065-0.
on Improved BP Wavelet Neural Network ( IEEE,2008)
5. S. Fu-ke, Z. Wei, C.Pan, An Engineering Approach to 978-1-4244-2107-7.
Prediction of Network Traffic Based on Time Series
23. L.J fei, S. Lei, T. Yongan, Prediction Of Network
Model ( IEEE, 2009) 978-0-7695-3615-6.
Flow Based On Wavelet Analysis And ARIMA Model (
6. I.Klevecka, Forecasting Network Traffic loads neural IEEE,2009) 978-0-7695-3901-0.
network and Linear (ISSN 1407-5806, 2009) Vol.14,
24. H.Zhao, Multiscale Analysis and Prediction of Network
No.2 , pp.20-28.
Traffic ( IEEE, 2009) 978-1-4244-5737-3.
7. E. S. Yu, C.Y.R.Chen, Traffic Prediction Using Neural
25. Y. Yu, J. Wang, M. Song, J. Song, Network Traffic
Net works ( I E E E , 1993) 0-7803-0917-0.
prediction and result analysis based seasonal and
8. T. Qin, X. Guan, W. Li, P.Wang, Monitoring Malicious ARIMA and Correlation Coefficient (IEEE, 2010) 978-
Traffic Flow Based on Independent Component 1-4244-8333-4.
Analysis, ( IEEE ,2009) 978-1-4244-3434-3.
26. Y.Zhou, Guangmin, H.W He, Using Graph to Detect
9. G. Rutka, Some Aspects of Traffic Analysis used for Anomaly ( IEEE, 2009) 978-1-4244-4886-9
Internet Traffic Prediction (ISSN, 2009) 1392 1215.
27. N.Gupta, N.Singh, V. Sharma, T. Sharama, A.S.
10. S. Chabaa1, A. Zeroual1, J. Antari1, Identification and Bhandra, Feature Selection and Classification of intrusion
Prediction of Internet Traffic Using Artificial Neural detection using rough set (International Journal of
Networks (scientific research, 2010) 2, 147-155. Communication Network Security, 2013)ISSN: 2231
1882, Volume-2, Issue-2.
1
Network Traffic Analysis and Prediction
(International Journal of Network Security & Its
28. A.R Syed, A.S.M Burney, B. Sami, Traffic Forecasting Applications (IJNSA), 2009 ) Vol 1, No 1.
Network Loading Using Wavelet Filter and seasonal 44. X. Tiani, Q. Sun, X. Hunga, Yan M.A, Dynamic
Autoregressive Moving Average Model (International Online Traffic Classification using Data Stream Mining
Journal of Computer and Electrical Engineering, 2010) ( IEEE,2008)
Vol.2, No.6. 45. J. Koshal, M. Bag, Cascading of C4.5 Decision Tree and
29. Y. Shu, M.Yu, J. Liu, O.W.W. Yang, Wireless Traffic Support Vector Machine for Rule Based Intrusion
Modeling and Prediction Using Seasonal ARIMA Detection System (Computer Network and Information
Models ( IEEE, 2003) 0-7803-7802-4. Security, 2012) , 8, 8-20.
30. M. F. Iqbal, L. K. John, Power and Performance Analysis 46. W. He, G. H. Xingmiao, H. Xiang, Multiple Time
of Network Traffic Prediction Techniques (IEEE, 2012) Series Data Mining to Large- Scale Network Traffic
978-1-4673-1146-5/12. Analysis ( IEEE, 2008) 978-1-4244-1673-8.
31. B. Vujicic, H.Chen, L. Trajkovic, P r e d i c t i o n of 47. W. He, G. Hu, Analyze Large-scale Communication
Traffic in a Public Safety Network ( IEEE, 2006) -7803- Network Behavior through Mining TCP Control
9389-9. Segment Information ( IEEE, 2009) 978-1-4244-4886-9.
32. B. Zhou,D. He, Z. Sun, Traffic predictable based on 48. R. Lath, M. Shrivastava, Analytical Study of Different
ARIMA/GARCH Model ( IEEE, 2006) 0-7803-9455-0. Classification Technique for KDD Cup Data (201) 99.Vol
33. P. Cortez, M. Rio, M. Rocha, P.Sousa, Internet Traffic 3 No.6.
Forecasting using Neural Networks ( IEEE, 2006 ) 0- 49. I. B.Arya , R.Mishra., Internet Traffic Classification: An
7803-9490-9. Enhancement in Performance using Classifiers ( 2011)
34. Y. Bouzida, F. Cuppens, N. Cuppens-Boulahia and S. Vol. 2 pp. 663-667.
Gombault, Efficient Intrusion Detection Using Principal 50. S. Peddabachigari, A. Abraham, J. Thomas, Intrusion
Component Analysis ( Departement RSM GET/ ENST Detection Systems Using Decision Trees and Support
Bretagne 2, rue de la Chataigneraie, CS , 2004) Vector Machines (Department of Computer Science,
1760735576. Oklahoma State University, USA, 2004)
35. V. S. Takkellapati1, G.V.S.N.R.V Prasad, Network 51. G. P.Dubey, N. Gupta, R. K Bhujade, A Novel Approach
Intrusion Detection system based on Feature Selection to Intrusion Detection System using Rough Set Theory
and Triangle area Support Vector Machine ( International and Incremental SVM (International Journal of Soft
Journal of Engineering Trends and Technology, 2012) Computing and Engineering (IJSCE), 2011) 2231-2307,
Vol 3 Issue4 Volume-1, Issue-1.
36. .X. Li, x.U Zheng, J. Li,S. Wang, Frequent Item sets 52. S. Mukkamala, G.Janoski, A. Sung, Intrusion Detection:
Mining in Network Traffic Data ( IEEE, 2012) 978-1- Support Vector Machines and Neural Networks ( IEEE,
4673-0470-2. 2002) 0-7803-7278-6.
37. Z.A.Othman, E.E. Eljadi, Network Anomaly Detection 53. S. lakhina, S. Joseph2 and B. verma3, Feature Reduction
Tools B a s e d on Association Rules (IEEE, 2011) 978-1- using Principal Component Analysis for Effective
4577-0753-7. AnomalyBased Intrusion Detection on NSL-KDD (
38. P. G. Jeya, M. Ravichandran, C. S. Ravichandran, International Journal of Engineering Science and
Efficient Classifier for R2L and U2R Attacks Technology, 2010) Vol. 2(6), 1790-1799.
(International Journal of Computer Applications, 2012 54. B.Raahemi,A.Kouznetsov,A.Hayajneh,P,Classification of
)Volume 45 No.21. peer-to peer traffic using incremental neural network
39. H.Tu, Z. Li, B. Liu, Mining Network Traffic for Worm (IEEE, 2008) 978-1-4244-1642-4.
Signature Extraction ( IEEE, 2008) 978-0-7695-3305-6. 55. G.kalyan and A.Jaya Lakshmi, Performance assessment
40. M. Vijayakumar, R.M.S.Parvathi, Concept Mining of of different classification techniques for intrusion
High Volume Data Streams in Network Traffic Using detection ( JORS Journal of computer engineering
Hierarchical Clustering (Academic Journal, 2010) Vol. (IOSRJCE), 2012) 2278-8727 Volume 7, Issue 5.
39 Issue 2, p234. 56. Sivakuma, E. Ashok s Kumar, G. Sivaradje, Prediction
41. J. Kaur, S.Agrawal and B.S.Sohi, Internet Traffic of Traffic Load in Wireless Network using Time
Classification for Educational Institutions Using Machine Series Model (IEEE, 2011) 978-1-61284-765-8.
Learning (Intelligent Systems and Applications, 2012) 8, 57. W. Yassin, N. I. Udzir1, Z. Muda, and Md. N.Sulaiman,
37-45. Anomaly based Intrusion Detection Through K-means
42. B.Yu, H. Fei, Performance Impact of Wireless Mesh and Naives Bayes Classification IEEE, 2011 ) 978-1-
Networks with Mining Traffic Patterns ( IEEE, 2008) 61284-128-1.
978-0-7695-3305-6. 58. J. Erman, M. Arlit, A. Mahanti, Traffic Classification
43. R.Ching Chen , K. Cheng and C. Hsieh, Using Rough Using Clustering Algorithm (ACM, 2006) 1-59593-417-
set and Support Vector Machine for intrusion detection 0/06/0009.
Network Traffic Analysis and Prediction
59. Y.Kumar Jain, Upendra, Intrusion Detection using 75. P. Bhoria, K. Garg, Determining feature set of DOS
Supervised Learning with Feature Set Reduction (2011) attacks ( International Journal of Advanced Research in
Volume 33 No.6. Computer Science and Software Engineering, 2013)
60. Z. Mingqiang, H. Hui, W. Qian, A Graph-based Volume 3, Issue 5, ISSN: 2277 128X.
Clustering Algorithm for Anomaly Intrusion D etection ( 76. http://kdd.ics.uci.edu
IEEE, 2012) 978-1-4673-0241-8. 77. http://nsl.cs.unb.ca
61. S. Chabaa, A. Zeroual, J. Antari, ANFIS Method for 78. http://caida.rg
Forecasting Internet Traffic Time Series (
MINGQIANG,2009). 79. http://wand.net.nz/wits
62. J. Zhang, M. Zulkern, Anomaly Based Network Intrusion 80. http://ita.ee.lbl.gov/html/traces.html
Detection with Unsupervised Outlier Detection (1EEE, 81. http://sysnet.ucsd.edu/pawn/sigcomm-trace
2006) 1-4244-0355-3. 82. http://ll.mit.edu
63. M. Panda1 and M. Ranjan Patra, Network Intrusion 83. http://iscx.ca
Detection of Using Naive Bayes (IJCSNS International
84. http://netresec.com
Journal of Computer Science and Network
Security.2007) Vol.7 No.12. 85. .Han, M.Kamber , data mining concept and techniques
(second edition) .
64. S.K. Shrivastava and P.Jain, Effective Anomaly based
Intrusion Detection using Rough Set Theory and Support 86. JR.C Stademeyer, C.W.Omlin, feature set reduction for
Vector Machine ( International Journal of Computer automatic network intrusion detection with machine
Applications,2011) Volume 18 No.3. learning ( maxborn institute for nonlinear optic and short
pulse, 2009)
65. G. Rutka, Network Traffic Prediction using ARIMA and
Neural Networks Models ( ISSN, 2008)1392 121.
66. Z.Miller,W.Deitrick,W.Hu, Anomalous Network Packet
Detection Using Data Stream Mining (Journal of
Information Security, 2011) 2, 158-168
67. Neethu B, Classification of Intrusion Detection Dataset
using machine learning Approaches ( ISSN) 2277-1956.
68. F. S. Gharehchopogh, N. Jabbari, Z. G. Azar, Evaluation
of Fuzzy K-Means And K-Means Clustering Algorithms
In Intrusion Detection Systems ( International journal of
scientific and technology research, 2012) ,Vol 1, Issue
11.
69. K. Al-Nafjan , M. A. Al-Hussein , A. S. Alghamdi, M. A.
Haque, and I. Ahmad, Intrusion Detection Using PCA
Based Modular Neural Network (International Journal of
Machine Learning and Computing, 2012) Vol. 2, No. 5.
70. Xin Du, Yingjie Yang, Xiaowen Kang, Research of
Applying Information Entropy and Clustering
Techniqueon Network Traffic Analysis ( IEEE, 2008)
978-0-7695-3508-1.
71. R. Datti, B. verma, Feature Reduction for Intrusion
Detection Using Linear Discriminate Analysis (
International Journal on Computer Science and
Engineering, 2010) Vol. 02, No. 04, , 1072-1078
72. Sadek, Rowayda A.; Soliman, M. Sami; Elsayed, Hagar
S., Effective Anomaly Intrusion Detection System based
on Neural Network with Indicator Variable and Rough
set Reduction ( Academic Journal, 2013)
73. Heba F. Eid, A. Darwish, A.E. Hassanien and
A.Abraham, Principle Components Analysis and Support
Vector Machine based Intrusion Detection System (IEEE,
2010)978-1-4244-8136.
74. Upendra, Y. K. Jain, An Empirical Comparison and
Feature Reduction Performance Analysis of Intrusion
Detection (International Journal of Control Theory and
Computer Modeling (IJCTCM) , 2012 )Vol.2, No.1.