[1]
|
Scarfone, K. and Mell, P. (2007) Guide to Intrusion and Prevention System (IDPS). Department of Commerce, National Institute of Standard and Technology, Technology Administration.
http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
|
[2]
|
Widrow, B., Rumelhart, D.E. and Lehr, M.A. (1994) Neural Networks: Applications in Industry, Business and Science. Communications of the ACM, 37, 93-105. http://dx.doi.org/10.1145/175247.175257
|
[3]
|
Muthuramalingam, A., Himavathi, S. and Srinivasan, E. (2008) Neural Network Implementation Using FPGA: Issues and Application. The International Journal of Information Technology, 4, 86-92.
|
[4]
|
Tommiska, M.T. (2003) Efficient Digital Implementation of the Sigmoid Function for Reprogrammable Logic. IEEE Proceedings of Computers and Digital Techniques, 150, 403-411.
|
[5]
|
Mukhopadhyay, I., Chakraborty, M. and Chakarbarti, S. (2011) A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems. Journal of Information Security, 1, 28-38.
http://dx.doi.org/10.4236/jis.2011.21003
|
[6]
|
Savran, A. and ünsal, S. (1999) Hardware Implementation of a Feed forward Neural Network Using FPGAs’. Department of Electrical and Electronics Engineering, Ege University.
|
[7]
|
Haykin, S. (1999) Neural Networks—A Comprehensive Foundations. Prentice-Hall International, New Jersey.
|
[8]
|
Rai, C.S. and Singh, A.P. (2006) A Review of Implementation Techniques for Artificial Neural Networks. University School of Information Technology, GGS Indraprastha University, Delhi.
|
[9]
|
(2014) SNORT User Manual. http://www.snort.org/
|
[10]
|
Chang, R.-I, Lai, L.-B., Su, W.-D., Wang, J.-C. and Kouh, J.-S. (2007) Intrusion Detection by Back Propagation Neural Networks with Sample-Query and Attribute-Query. International Journal of Computational Intelligence Research, 3, 6-10.
|
[11]
|
Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J. and Speeds, L. (2004) Deep Packet Inspection Using Parallel Bloom Filters.
|
[12]
|
Mukhopadhyay, I., Chakraborty, M., Chakrabarti, S. and Chatterjee, T. (2011) Back Propagation Neural Network Approach to Intrusion Detection System. The Proceeding of International Conference on Recent Trend in Information System (ReTIS-11), Kolkata, 21-23 December 2011, 303-308.
|
[13]
|
KDD Cup (1999) Computer Network Intrusion Detection.
http://www.sigkdd.org/kdd-cup-1999-computer-network-intrusion-detection
|
[14]
|
Mukhopadhyay, I., Chakraborty, M. and Chatterjee, T. (2012) Artificial Neural Network Modeling of Intrusion Detection & Prevention System. IEM International Journal of Management & Technology, 2.
|
[15]
|
Manners, D. (2011) Electronics Weekly. Xilinx Launches 20m ASIC Gate Stacked Silicon FPGA.
|
[16]
|
Vahid, F. (2010) Digital Design with RTL Design, Verilog and VHDL. 2nd Edition, John Wiley and Sons, 247.
|