DOI:10.20894/IJWT.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.78 & GIF:0.428
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJWT provides online manuscript tracking system.

Every issue of Journal of IJWT is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJWT special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJWT website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 5 Issue 1 Date of Publication:   June 2016

Signature Based Algorithms and Intrusion Detection Systems

T. Sree Kala,A.Christy

Page(s):   09-12 ISSN:   2278-2397
DOI:   10.20894/IJWT.104.005.001.003 Publisher:   Integrated Intelligent Research (IIR)


  1. Y.Weinsberg. S Tzur-David, D.Doley, and T.Anker,   "High Performance String Matching Algorithm for a Network Intrusion Prevention Systems(NIPS)",   High Performance Switching and Routing, IEEE   ,2006
    View Artical

  2. J. P. Anderson,   "Computer Security Threat Monitoring and Surveillance",   Jammes P Anderson and Co, Fort ashington, Pennsylv   ,1980
    View Artical

  3. R. Heady, G. Luger, A. Maccabe, and M. Servilla,   "The Architecture of a Network Level Intrusion Detection System",   Computer Science Department, University of New Mex   ,1990
    View Artical

  4. H. G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood,   "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detecti",   in Proc. 3rd Annual Conference on Privacy, Securit   ,2005
    View Artical

  5. A. A. Ghorbani, W. Lu, and M. Tavallaee,   "Network Intrusion Detection and Prevention: Concepts and Techniques",   ser. Advances in Information Security, Springer-Ve   ,2009
    View Artical

  6. A. Singhal,   "Data Warehousing and Data Mining Techniques for Cyber Security",   Advances in Information Security, Springer   ,2007
    View Artical

  7. D. Stiawan, A.H. Abdullah, and M.Y. Idris,   "The Trends of Intrusion Prevention System Network",   International Conference Education Technology and    ,2010
    View Artical

  8. S.H. Oh and W.K. Lee,   "An anomaly intrusion detection method by clustering normal user Behavior",   Computers & Security   ,Vol.22   ,2003
    View Artical

  9. A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers,   "Alert Verification Evaluation Through Server Response Forging",   INCS   ,2007
    View Artical

  10. H. Artail, H. Safa, M. Sraj, I. Kuwatly, and Z. Almasri,   "A hybrid honeypot Framework for improving intrusion detection systems in protecting organizational n",   Computer & Security   ,Vol.25   ,2006
    View Artical

  11. P. Garcia-Teodora, J. Dian-Verdejo, G. Macia- Femandez, and E. Vazquez,   "Anomaly- based network intrusion detection Techniques, systems and challenges",   Computer & Security   ,Vol.28   ,2009
    View Artical

  12. Wikipedia,   "Intrusion Detection System   ,2009
    View Artical

  13. H.Bhuyan, D. K. Bhattacharyya, and J. K.Kalita,   "Surveying Port Scans and Their Detection Methodologies",   The Computer Journal   ,Vol.54   ,2011
    View Artical

  14. Joseph Migga Kizza,   "Computer Network Security   ,2005
    View Artical

  15. Lata, ashyap Indu,   "Novel Algorithm for Intrusion Detection System",   IJARCCE   ,2013
    View Artical

  16. Siddarth Saha,   "Network Intrusion Detection System Using String Matching",   Internet   ,2010
    View Artical

  17. Y.Weinsberg. S Tzur-David, D.Doley, and T.Anker,   "High Performance String Matching Algorithm for a Network Intrusion Prevention Systems(NIPS)",   High Performance Switching and Routing, IEEE   ,Vol.    ,2006
    View Artical

  18. R. Heady, G. Luger, A. Maccabe, and M. Servilla,   "The Architecture of a Network Level Intrusion Detection System",   Computer Science Department, University of New Mex   ,Vol.    ,1990
    View Artical

  19. H. G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood,   "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detecti",   in Proc. 3rd Annual Conference on Privacy, Securit   ,Vol.    ,2005
    View Artical

  20. D. Stiawan, A.H. Abdullah, and M.Y. Idris,   "The Trends of Intrusion Prevention System Network",   International Conference Education Technology and    ,Vol.    ,2010
    View Artical

  21. S.H. Oh and W.K. Lee,   "An anomaly intrusion detection method by clustering normal user Behavior",   Computers & Security   ,Vol.22   ,2003
    View Artical

  22. A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers,   "Alert Verification Evaluation Through Server Response Forging",   INCS   ,2007
    View Artical

  23. H. Artail, H. Safa, M. Sraj, I. Kuwatly, and Z. Almasri,   "A hybrid honeypot Framework for improving intrusion detection systems in protecting organizational n",   Computer & Security   ,Vol.25   ,Issue 4   ,2006
    View Artical

  24. P. Garcia-Teodora, J. Dian-Verdejo, G. Macia- Femandez, and E. Vazquez,   "Anomaly- based network intrusion detection Techniques, systems and challenges",   Computer & Security   ,Vol.28   ,Issue 2   ,2009
    View Artical

  25. H.Bhuyan, D. K. Bhattacharyya, and J. K.Kalita,   "Surveying Port Scans and Their Detection Methodologies",   The Computer Journal   ,Vol.54   ,Issue 10   ,2011
    View Artical

  26. Joseph Migga Kizza,   "Computer Network Security",   Computers & Electrical Engineering    ,Vol.35   ,Issue 3   ,2005
    View Artical

  27. Lata, ashyap Indu,   "Novel Algorithm for Intrusion Detection System",   IJARCCE   ,Vol.2   ,Issue 5   ,2013
    View Artical

  28. S.H. Oh and W.K. Lee,   "An anomaly intrusion detection method by clustering normal user Behavior",   Computers & Security   ,Vol.22   ,Issue 7   ,2003
    View Artical

  29. A.D. Todd, R.A. Raines, R.O. Baldwin, B.E. Mullins, and S.K. Rogers,   "Alert Verification Evaluation Through Server Response Forging",   INCS   ,2007
    View Artical