1. Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1–22 (2019)
2. Sureda, R.T., Higuera, J.R.B., Higuera, J.B., Herraiz, J.J.M., Montalvo, J.A.S.: Prevention and fighting against web attacks through anomaly detection technology. A systematic review. Sustainability 12(12), 1–45 (2020)
3. Aldwairi, M., Abu-Dalo, A.M., Jarrah, M.: Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. EURASIP J. Info. Securi. 2017, 9 (2017)
4. Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Generat. Comput. Syst. 96, 481–489 (2019)
5. The Snort Project. The Snort Users Manual 2.9.16. 2020. [online] https://snort-org-site.s3.amazonaws.com/production/document_files/files/000/000/249/original/snort_manual.pdf. Accessed 15 Oct 2021