Bibliografia

[1] Bro Documentation and Training. Disponível em: Bro Website. Acesso em: 5 nov. 2016.

[2] Brown, D.J.; Suckow, B.; Wang, T. A Survey of Intrusion Detection Systems. Department of Computer Science, University of California, San Diego; 2002.

[3] Larrieu, C. Sistemas de detecção de intrusão (IDS). Disponível em: CCM - Comunidade Online. Acesso em: 7 nov. 2016.

[4] Mehra, P. A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems. International Journal of Advanced Research in Computer and Communication Engineering, v. 1, n. 6, p. 383-386, 2012.

[5] Modi, C. et al. A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, v. 36, n. 1, p. 42-57, 2013.

[6] Paxson, V. Bro: a system for detecting network intruders in real-time. Computer Networks, v. 31, n. 23-24, p. 2435-2463, 1999.

[7] Santos, V. Sistemas de Detecção de Intrusões (IDS – Intrusion Detection Systems) usando unicamente softwares Open Source. Disponível em: seginfo. Acesso em: 7 nov. 2016.

[8] Singh, S. INTRUSION DETECTION SYSTEMS (IDS) AND INTRUSION PREVENTION SYSTEMS (IPS) FOR NETWORK SECURITY: A CRITICAL ANALYSIS. International Journal of Research in Engineering & Applied Sciences, v. 3, n. 3, p. 1-9, 2013.

[9] Snyder, J. Do you need an IDS or IPS, or both?. Disponível em: search security. Acesso em: 7 nov. 2016.

[10] Garfinkel, T.; Rosenblum, M. A Virtual Machine Introspection Based Architecture for Intrusion Detection. NDSS, v. 3, 2003.

[11] Jabez, J.; Muthukumar, B. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach. Procedia Computer Science, v. 48, p. 338-346, 2015.

[12] Javidi, M.; M., Rafsanjani, M. K.Hashemi, S. et al. An Overview of Anomaly based Database Intrusion Detection Systems. Indian Journal of Science and Technology, v. 5, n. 10, p. 3550-3559, 2016.

[13] Kent Frederick, K. Network Intrusion Detection Signatures, Part One: Symantec Connect. Disponível em: Symantec.com . Acesso em: 28 nov. 2016.

[14] Nordrum, A. Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated. Disponível em: IEEE Spectrum: Technology, Engineering, and Science News. Acesso em: 28 nov. 2016.

[15] Owezarski, P. A Database of Anomalous Traffic for Assessing Profile Based IDS. Traffic Monitoring and Analysis, p. 59-72, 2010.

[16] Scully, P. Where can I get the latest dataset for a network intrusion detection system? Disponível em: Quora. Acesso em: 28 nov. 2016.

[17] Hilton, S. Dyn Analysis Summary of Friday October 21 Attack. Disponível em: Dyn. Acesso em 28 nov. 2016.