References
- Ministry of Communications and Information Technology, Government of India, "National cyber security policy." [Online]. Available: https://www.meity.gov.in/writereaddata/files/ncsp060411.pdf
- Ministry of Communications and Information Technology, Government of India , "Intermediary guidelines and digital media ethics code rules 2021." [Online]. Available: https://bit.ly/3AEjRxJ
- Ministry of Power, Government of India, "Cybersecurity in power sector guidelines 2021." [Online]. Available: https://bit.ly/3yUjjT1.
- S. Sharma and M. Khadke, "Network Security: A Major Challenge in India," in 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, pp. 1-5. [Online]. Available: https://ieeexplore.ieee.org/document/8777642/
- N. Chauhan, "Almost 300% rise in cyberattacks in india in 2020, govt tells parliament," The Hindustan Times. [Online]. Available: https://www.hindustantimes.com/india-news/almost-300-rise-in-cyber-attacks-in-india-in-2020-govt-tells-parliament-101616496416988.html
- D. Bhardwaj, "In wake of increased attacks, govt trains 4,000 officials in cybersecurity," The Hindustan Times. [Online]. Available: https://www.hindustantimes.com/india-news/in-wake-of-increased-attacks-govt-trains-4-000-officials-incybersecurity-101617683297609.html.
- Col. Sanjeev Relia, "India's tryst with a new national cyber security policy: Here's what we need," Financial Express. [Online].Available: https://www.financialexpress.com/defence/indias-trystwith-a-new-national-cyber-security-policy-heres-what-we-need/2304053/.
- S. Gatlan, "Red cross: State hackers breached our network using zoho bug," Bleeping Computer. [Online]. Availiable: https://www.bleepingcomputer.com/news/security/red-cross-state-hackers-breached-our-network-using-zoho-bug
- G. Cluley, "Greenland hit by cyber attack, finds its health service crippled," Bitdefender. [Online]. Availiable: https://www.bitdefender.com/blog/hotforsecurity/greenland-hit-by-cyber-attack-finds-its-health-service-crippled.
- A. Khraisat, I. Gondal, P. Vamplew, and J. Kamruzzaman, "Survey of intrusion detection systems: Techniques, datasets and challenges," vol. 2, no. 1, p. 20. [Online]. Available: https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7/
- E. Anthi, L. Williams, P. Burnap, and K. Jones, "A three-tiered intrusion detection system for industrial control systems," vol. 7, no. 1, p. tyab006. [Online]. Available: https://doi.org/10.1093/cybsec/tyab006
- K. Lakkaraju and A. Slagell, "Evaluating the utility of anonymized network traces for intrusion detection," in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks - SecureComm '08. ACM Press, p. 1. [Online]. Available: http://portal.acm.org/citation.cfm?doid=1460877.14608999.
- R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," vol. 36, no. 1, pp. 29-38 [Online]. Available: https://dl.acm.org/doi/10.1145/1111322.1111330.
- S. Geravand and M. Ahmadi, "Bloom filter applications in network security: A state-of-the-art survey," pp. 4047-4064, 2013. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1389128613003083.
- R. Patgiri, S. Nayak, and S. K. Borgohain, "Hunting the pertinency of bloom filter in computer networking and beyond: A survey," Journal of Computer Networks and Communications, vol. 2019, p. 2712417, Feb 2019. [Online]. Available: https://doi.org/10.1155/2019/2712417.