1. Anderson, J.P.: Computer Security Planning Study. Washington (1972). Retrieved from
https://pdfs.semanticscholar.org/0735/6c5477c83773bd062b525f45c433e5b044e8.pdf
2. Bruneau, G.: The History and Evolution of Intrusion Detection, vol. 7 (2001). Retrieved from
https://www.sans.org/reading-room/whitepapers/detection/history-evolution-intrusion-detection-344
3. Patel, A., Taghavi, M., Bakhtiyari, K., Júnior, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36, 25–41 (2013)
4. Amudhavel, J., Brindha, V., Anantharaj, B., Karthikeyan, P., Bhuvaneswari, B., Vasanthi, M., Nivetha, D., Vinodha, D.: A survey on intrusion detection system: State of the art review. Indian J. Sci. Technol. 9, 1–9 (2016)
5. Ahmad, K., Verma, S., Kumar, N., Shekhar, J.: Classification of internet security attacks. In: Proceedings of the 5th National Conference; INDIACom-2011. New Delhi (2011). Retrieved from
https://www.researchgate.net/publication/262494946_Classification_of_Internet_Security_Atta