1. Internet Security Threat Report. Symantec. 22: (2017). Available from: https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf .
2. DE Denning, Stuxnet: what has changed?Future Internet. 4(3), 672–687 (2012).
3. M Ahmed, AN Mahmood, J Hu, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60:, 19–31 (2016).
4. MU Modi, A Jain, A survey of IDS classification using KDD CUP 99 dataset in WEKA. Int. J. Sci. Eng. Res. 6(11), 947–954 (2015).
5. MS Kumar, A survey on improving classification performance using data pre processing and machine learning methods on NSL-KDD data. Int. J. Eng. Comput. Sci. 5:, 16156–16161 (2016).