<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2227-1899</journal-id>
<journal-title><![CDATA[Revista Cubana de Ciencias Informáticas]]></journal-title>
<abbrev-journal-title><![CDATA[Rev cuba cienc informat]]></abbrev-journal-title>
<issn>2227-1899</issn>
<publisher>
<publisher-name><![CDATA[Editorial Ediciones Futuro]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2227-18992020000100058</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Systematic Literature Review on Intrusion Detection Approaches]]></article-title>
<article-title xml:lang="es"><![CDATA[Una revisión sistemática de la literatura sobre los enfoques de detección de intrusiones]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aludhilu]]></surname>
<given-names><![CDATA[Hilma]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez-Puente]]></surname>
<given-names><![CDATA[Rafael]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,University of Namibia Computer Science Departament School of Computin ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2020</year>
</pub-date>
<volume>14</volume>
<numero>1</numero>
<fpage>58</fpage>
<lpage>78</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S2227-18992020000100058&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S2227-18992020000100058&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S2227-18992020000100058&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Nowadays, intrusion detection systems play a major role in system security. Ideally, intrusion detection systems are capable of detecting intrusions in real time to prevent intruders from causing any harm to computer systems. Intrusion detection systems can be implemented using different intrusion detection approaches with its strengths and limitations. This paper provides an overview of the strengths and limitations of the different intrusion detection approaches, including Statistical-Based Anomaly, Pattern Matching, Data Mining and Machine Learning approach. The results show that Machine Learning is the most suitable approach for implementing intrusion detection system solutions, because of its ability to work as an automated process, which hardly needs human intervention. Using this partial conclusion, different machine learning techniques are studied and presented, also with their strengths and limitations. After the study, it can be concluded that the best technique to implement this kind of system is recurrent neural networks. An intrusion detection systems that hardly needs human intervention, can be developed and implemented, using this technique.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Hoy en día, los sistemas de detección de intrusos juegan un papel importante en la seguridad de los sistemas informáticos. Idealmente, los sistemas de detección de intrusos son capaces de detectar intrusiones en tiempo real para evitar que los intrusos causen daños a los sistemas informáticos. Los sistemas de detección de intrusos se pueden implementar utilizando diferentes enfoques de detección de intrusos con sus puntos fuertes y limitaciones. Este documento proporciona una visión general de las fortalezas y limitaciones de los diferentes enfoques de detección de intrusos, incluido el enfoque de anomalías basadas en estadísticas, coincidencia de patrones, minería de datos y aprendizaje automático. Los resultados muestran que el aprendizaje automático es el enfoque más adecuado para implementar soluciones de sistemas de detección de intrusos, debido a su capacidad para funcionar como un proceso automatizado, que apenas necesita intervención humana. Usando esta conclusión parcial, se estudian y presentan diferentes técnicas de aprendizaje automático, enfatizando en sus fortalezas y limitaciones. Después del estudio realizado, se puede concluir que la mejor técnica para implementar este tipo de sistema son las redes neuronales recurrentes. Mediante esta técnica, se puede desarrollar e implementar un sistema de detección de intrusos que apenas necesita intervención humana.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Intrusion Detection Systems]]></kwd>
<kwd lng="en"><![CDATA[IDS]]></kwd>
<kwd lng="en"><![CDATA[Intrusion Detection Approaches]]></kwd>
<kwd lng="en"><![CDATA[System Security]]></kwd>
<kwd lng="es"><![CDATA[sistemas de detección de intrusiones]]></kwd>
<kwd lng="es"><![CDATA[SDI]]></kwd>
<kwd lng="es"><![CDATA[enfoques de detección de intrusiones]]></kwd>
<kwd lng="es"><![CDATA[seguridad de sistemas]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[Gaurav]]></given-names>
</name>
<name>
<surname><![CDATA[Soni]]></surname>
<given-names><![CDATA[Shivank Kumar]]></given-names>
</name>
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[Chetan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS.]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer Science]]></source>
<year>2017</year>
<volume>8</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>499-504</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[Mohiuddin]]></given-names>
</name>
<name>
<surname><![CDATA[Naser Mahmood]]></surname>
<given-names><![CDATA[Abdun]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Jiankun]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey of network anomaly detection techniques.]]></source>
<year>2016</year>
<publisher-name><![CDATA[Academic Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amor]]></surname>
<given-names><![CDATA[Nahla Ben]]></given-names>
</name>
<name>
<surname><![CDATA[Benferhat]]></surname>
<given-names><![CDATA[Salem]]></given-names>
</name>
<name>
<surname><![CDATA[Elouedi]]></surname>
<given-names><![CDATA[Zied]]></given-names>
</name>
</person-group>
<source><![CDATA[Naive Bayesian Networks in Intrusion Detection Systems.]]></source>
<year>2003</year>
<publisher-name><![CDATA[The Fourteenth European Conference on Machine Learning.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chollet]]></surname>
<given-names><![CDATA[François]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep Learning with Python.]]></source>
<year>2017</year>
<publisher-name><![CDATA[Manning Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choudhary]]></surname>
<given-names><![CDATA[Amit Kumar]]></given-names>
</name>
<name>
<surname><![CDATA[Swarup]]></surname>
<given-names><![CDATA[Akhilesh]]></given-names>
</name>
</person-group>
<source><![CDATA[Neural network approach for intrusion detection.]]></source>
<year>2009</year>
<page-range>1297-301</page-range><publisher-name><![CDATA[ACM International Conference Proceeding Series.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chowdhury]]></surname>
<given-names><![CDATA[Md. Nasimuzzaman]]></given-names>
</name>
<name>
<surname><![CDATA[Ferens]]></surname>
<given-names><![CDATA[Ken]]></given-names>
</name>
<name>
<surname><![CDATA[Ferens]]></surname>
<given-names><![CDATA[Mike]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Intrusion Detection Using Machine Learning.]]></source>
<year>2016</year>
<publisher-name><![CDATA[International Conference on Security and Management]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dias]]></surname>
<given-names><![CDATA[L. P]]></given-names>
</name>
<name>
<surname><![CDATA[Cerqueira]]></surname>
<given-names><![CDATA[J. J.F]]></given-names>
</name>
<name>
<surname><![CDATA[Assis]]></surname>
<given-names><![CDATA[K. D.R]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[R. C]]></given-names>
</name>
</person-group>
<source><![CDATA[Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer Science and Electronic Engineering Conference, CEEC 2017 - Proceedings.]]></source>
<year>2017</year>
<page-range>145-50</page-range><publisher-name><![CDATA[Institute of Electrical and Electronics Engineers Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García-Teodoro]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz-Verdejo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Maciá-Fernández]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anomaly-based network intrusion detection: Techniques, systems and challenges.]]></article-title>
<source><![CDATA[Computers and Security]]></source>
<year>2009</year>
<volume>28</volume>
<numero>1-2</numero>
<issue>1-2</issue>
<page-range>18-28</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ragha]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Intrusion detection system using support vector machine.]]></source>
<year>2013</year>
<page-range>25-30</page-range><publisher-name><![CDATA[International Conference and workshop on Advanced Computing.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jose]]></surname>
<given-names><![CDATA[Shijoe]]></given-names>
</name>
<name>
<surname><![CDATA[Malathi]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Reddy]]></surname>
<given-names><![CDATA[Bharath]]></given-names>
</name>
<name>
<surname><![CDATA[Jayaseeli]]></surname>
<given-names><![CDATA[Dorathi]]></given-names>
</name>
</person-group>
<source><![CDATA[A Survey on Anomaly Based Host Intrusion Detection System.]]></source>
<year>2018</year>
<publisher-name><![CDATA[Journal of Physics: Conference Series. Institute of Physics Publishing.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kadam]]></surname>
<given-names><![CDATA[Priya U]]></given-names>
</name>
<name>
<surname><![CDATA[Profmanjusha]]></surname>
<given-names><![CDATA[Deshmukh]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Various Approaches for Intrusion Detection System: An Overview.]]></article-title>
<source><![CDATA[International Journal of Innovative Research in Computer and Communication Engineering]]></source>
<year>2007</year>
<volume>3297</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[Parneet]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[Manish]]></given-names>
</name>
<name>
<surname><![CDATA[Bhandari]]></surname>
<given-names><![CDATA[Abhinav]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of detection approaches for distributed denial of service attacks.]]></article-title>
<source><![CDATA[Systems Science &amp; Control Engineering]]></source>
<year>2017</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>301-20</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khandagale]]></surname>
<given-names><![CDATA[Vaishali V]]></given-names>
</name>
<name>
<surname><![CDATA[Kalshetty]]></surname>
<given-names><![CDATA[Yoginath]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review and Discussion on different techniques of Anomaly Detection Based and Recent Work.]]></article-title>
<source><![CDATA[International Journal of Engineering Research &amp; Technology (IJERT)]]></source>
<year>2013</year>
<volume>2</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>5</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[Gulshan]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluation Metrics for Intrusion Detection Systems - A Study.]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Wen Hui]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Hsiao Chung]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Ping]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Bao Hua]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[Jeng Ying]]></given-names>
</name>
</person-group>
<source><![CDATA[Using convolutional neural networks to network intrusion detection for cyber threats.]]></source>
<year>2018</year>
<page-range>1107-10</page-range><publisher-name><![CDATA[Institute of Electrical and Electronics Engineers Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Yuchen]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Shengli]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Xing]]></given-names>
</name>
</person-group>
<source><![CDATA[Intrusion Detection Algorithm Based on Convolutional Neural Network.]]></source>
<year>2017</year>
<publisher-name><![CDATA[DEStech Publications.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marcelino]]></surname>
<given-names><![CDATA[Maria José]]></given-names>
</name>
<name>
<surname><![CDATA[Pessoa]]></surname>
<given-names><![CDATA[Teresa]]></given-names>
</name>
<name>
<surname><![CDATA[Vieira]]></surname>
<given-names><![CDATA[Celeste]]></given-names>
</name>
<name>
<surname><![CDATA[Salvador]]></surname>
<given-names><![CDATA[Tatiana]]></given-names>
</name>
<name>
<surname><![CDATA[Mendes]]></surname>
<given-names><![CDATA[António José]]></given-names>
</name>
</person-group>
<source><![CDATA[Learning Computational Thinking and scratch at distance.]]></source>
<year>2018</year>
<volume>80</volume>
<page-range>470-7</page-range><publisher-name><![CDATA[Computers in Human Behavior.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammadpour]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Ling]]></surname>
<given-names><![CDATA[T.C]]></given-names>
</name>
<name>
<surname><![CDATA[Liew]]></surname>
<given-names><![CDATA[C. S]]></given-names>
</name>
<name>
<surname><![CDATA[Chong]]></surname>
<given-names><![CDATA[C. Y]]></given-names>
</name>
</person-group>
<source><![CDATA[A Convolutional Neural Network for Network Intrusion Detection System.]]></source>
<year>2018</year>
<publisher-name><![CDATA[Proceedings of the Asia-Pacific Advanced Network]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Okoli]]></surname>
<given-names><![CDATA[Chitu]]></given-names>
</name>
<name>
<surname><![CDATA[Schabram]]></surname>
<given-names><![CDATA[Kira]]></given-names>
</name>
</person-group>
<source><![CDATA[A Guide to Conducting a Systematic Literature Review of Information Systems Research.]]></source>
<year>2012</year>
<publisher-name><![CDATA[SSRN Electronic Journal.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[Nirav J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jhaveri]]></surname>
<given-names><![CDATA[Rutvij H]]></given-names>
</name>
</person-group>
<source><![CDATA[Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey.]]></source>
<year>2015</year>
<page-range>468-72</page-range><publisher-name><![CDATA[Institute of Electrical and Electronics Engineers Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ponkarthika]]></surname>
<given-names><![CDATA[M, Dr]]></given-names>
</name>
<name>
<surname><![CDATA[Saraswathy]]></surname>
<given-names><![CDATA[V R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network Intrusion Detection Using Deep Neural Networks.]]></article-title>
<source><![CDATA[Asian Journal of Applied Science and Technology (AJAST) (Open Access Quarterly International Journal]]></source>
<year>2018</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>665-73</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rai]]></surname>
<given-names><![CDATA[Kajal]]></given-names>
</name>
<name>
<surname><![CDATA[Devi]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Guleria]]></surname>
<given-names><![CDATA[Ajay]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Decision Tree Based Algorithm for Intrusion Detection.]]></article-title>
<source><![CDATA[International Journal Advanced Network and Applications]]></source>
<year>2016</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>2828-34</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Richariya]]></surname>
<given-names><![CDATA[Vineet]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[Uday Pratap]]></given-names>
</name>
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[Renu]]></given-names>
</name>
</person-group>
<source><![CDATA[Distributed Approach of Intrusion Detection System: Survey]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarmah]]></surname>
<given-names><![CDATA[Abhijit]]></given-names>
</name>
</person-group>
<source><![CDATA[Intrusion Detection Systems: Definition, Need and Challenges]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schell]]></surname>
<given-names><![CDATA[Bernadette H]]></given-names>
</name>
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[Clemens]]></given-names>
</name>
</person-group>
<source><![CDATA[Webster&#8217;s new world hacker dictionary.]]></source>
<year>2006</year>
<publisher-name><![CDATA[Wiley Pub.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[Asghar Ali]]></given-names>
</name>
<name>
<surname><![CDATA[Hayat]]></surname>
<given-names><![CDATA[Malik Sikander]]></given-names>
</name>
<name>
<surname><![CDATA[Awan]]></surname>
<given-names><![CDATA[Muhammad Daud]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of Machine Learning Techniques for Intrusion Detection System: A Review.]]></article-title>
<source><![CDATA[International Journal of Computer Applications.]]></source>
<year>2015</year>
<volume>119</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>19-29</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[Vikas]]></given-names>
</name>
<name>
<surname><![CDATA[Nema]]></surname>
<given-names><![CDATA[Aditi]]></given-names>
</name>
</person-group>
<source><![CDATA[Innovative genetic approach for intrusion detection by using decision tree.]]></source>
<year>2013</year>
<page-range>418-422.</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Nene]]></surname>
<given-names><![CDATA[Mj]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on machine learning techniques for intrusion detection systems.]]></article-title>
<source><![CDATA[International Journal of Advanced Research in Computer and Communication Engineering]]></source>
<year>2013</year>
<volume>2</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>4349-55</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vani]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards Efficient Intrusion Detection using Deep Learning Techniques: A Review.]]></source>
<year>2007</year>
<volume>3297</volume>
<publisher-name><![CDATA[International Journal of Advanced Research in Computer and Communication Engineering ISO. 2007.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinayakumar]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Soman]]></surname>
<given-names><![CDATA[K. P]]></given-names>
</name>
<name>
<surname><![CDATA[Poornachandran]]></surname>
<given-names><![CDATA[Prabaharan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluation of recurrent neural network and its variants for intrusion detection system (IDS).]]></article-title>
<source><![CDATA[International Journal of Information System Modeling and Design.]]></source>
<year>2017</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>43-63</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Qiren]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[Dasen]]></given-names>
</name>
</person-group>
<source><![CDATA[An intrusion detection algorithm based on decision tree technology.]]></source>
<year>2009</year>
<page-range>333-5</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
