DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 1 Date of Publication:   June 2015

Unknown Malware Attack by Using Intelligent Intrusion Multi Detection Systems

S.Murugan,K.Kuppusamy

Page(s):   12-17 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.001.004 Publisher:   Integrated Intelligent Research (IIR)


  1. Chebrolu S, Abraham A, Thomas JP,   "Feature detection and ensemble design of intrusion detection systems",   Compute Security   ,2005
    View Artical

  2. Chen Y, Abraham A, Yang J,   "Feature deduction and intrusion detection using flexible neural trees",   Second IEEE International Symposium on Neural Netw   ,2005
    View Artical

  3. Chen, Z., L. Gao, and K. Kwiat,   "Modeling the Spread of Active Worms",   Twenty-Second Annual Joint Conference of the IEEE    ,2003
    View Artical

  4. Chou T-S, Yen KK,   "Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks   ,2007
    View Artical

  5. Cohen F,   "Computer viruses: theory and experiments   ,1987
    View Artical

  6. Ghosh AK, Schwartzbard A,   "A study in using neural networks for anomaly and misuse detection.
    View Artical

  7. Ghosh AK, Schwartzbard A, Schatz M,   "Learning program behavior profiles for intrusion detection.",   In: Workshop on intrusion detection and network mo   ,1999
    View Artical

  8. Livadas C, Walsh B, Lapsley D, Strayer T,   "Using machine learning techniques to identify botnet traffic",   In: Second IEEE LCN workshop on network security (
    View Artical

  9. Meystel, A.M. & Albus, J.M.,,   "Intelligent systems architecture,design, and control",   New York,New York, John Wiley & Sons, Inc   ,2002
    View Artical

  10. Mukkamala S, Janoski G, Sung A,   "Designing intrusion detection systems: architectures and perspectives. In: Theinternational engineer",   annual review of communications   ,Vol.57   ,2004
    View Artical

  11. Mukkamala S, Sung A, Abraham A,   "Hybrid multi-agent framework for detection of stealthy probes
    View Artical

  12. Mukkamala S, Sung AH, Abraham A,   "Intrusion detection using ensemble of soft computing paradigms",   In: Third international conference on intelligent    ,2003
    View Artical

  13. Mukkamala S, Sung AH, Abraham A,   "Modeling intrusion detection systems using linear genetic programming approach",   international conference on industrial and enginee   ,2004
    View Artical

  14. Ourston D, Matzner S, Stump W, Hopkins B,   "Coordinated internet attacks: responding to attack complexity   ,2004
    View Artical

  15. Shah K, Dave N, Chavan S, Mukherjee S, Abraham A, Sanyal S,   "Adaptive neuro-fuzzy intrusion detection system   ,2004
    View Artical

  16. Wang W, Gombault S, Guyet T,   "Towards fast detecting intrusions:using key attributes of network traffic   ,2008
    View Artical

  17. Wang, J., et al,   "Internet Worm Early Detection and Response Mechanism",   The Journal of China Universities of Posts and Tel   ,Vol.14   ,2007
    View Artical