1. Network security., https://www.open.edu/openlearn/science-maths-technology/computing-and-ict/systems-computer/network-security/content-section-9.4. Last accessed 27 Sept 2021
2. Scarfone, K., Hoffman, P.: Guidelines on Firewalls and Firewall Policy, https://www.govinfo.gov/content/pkg/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855/pdf/GOVPUB-C13-f52fdee3827e2f5d903fa8b4b66d4855.pdf. Last accessed 27 Sept 2021
3. What Is an Intrusion Detection System? Latest Types and Tools, https://www.dnsstuff.com/intrusion-detection-system. Last accessed 27 Sept 2021
4. Bandakkanavar, R.: Intrusion detection system, https://krazytech.com/technical-papers/intrusion-detection-and-avoidance-system. Last accessed 27 Sept 2021
5. Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS), https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-94.pdf. Last accessed 27 Sept 2021