Intrusion Detection and Network Security Challenges: A Survey Report
VerifiedAdded on 2020/02/24
|9
|2684
|30
Report
AI Summary
This report presents a comprehensive analysis of network security issues, focusing on intrusion detection systems within the context of Technovy information technology companies. The study employs a survey methodology, utilizing questionnaires to gather data on challenges related to threats, attackers, and malicious software. The research investigates the applicability of data mining techniques for intruder detection and employs experimentation using machine-controlled software to assess the efficiency of different detection methods. The report details the system development methodology, feasibility study, data collection methods, and system specifications for developing a honeypot system. Key findings include the identification of challenges in current intrusion detection systems, effective data mining techniques, the importance of network security, and methods for differentiating between normal and intruded network traffic. The research proposes a framework to address intruder detection challenges and provides insights into the role of data mining in enhancing network security.

Chapter 3
Methodology
3.1 Introduction
This study aims at reviewing the security issues in network through a method known as survey1.
A survey was conducted for Technovy information technology companies whose intention was
for studying some of the challenges to intrusion, may it be threats, attackers with a bad motive or
even the malicious softwares for detection security in information system networks. The survey
was conducted using a questionnaire method.
This research explores the applicability of data or information extracted techniques for detecting
intruders or attackers in all ways2. For investigation to be a success in this area an experiment
method was performed. Various experimentations using softwares that are machine controlled
were performed in determining the efficiency of methods used for detecting intruders3. This
chapter will discuss in details the system development methodology, the feasibility study, facts
findings methods, data and system analysis methods and system specifications to be used in
developing the honeypot system4.
3.2 Statement of the Problem
One of the necessity of all IT companies is the security of the computer network with how it
expands. In security, factors which are critical in networks is detecting the intruders or attackers
on security of the computers. Detecting intruders has become a very challenging issue to deal
with as the connectivity increments in information systems and the services that they incorporate.
In this perspective “What are some of the encounters in detecting intruders attacking the security
in computer networks? Researcher pursues in studying the security issues in networks,
specifying the need of systems meant for detecting intruders and the challenges this system
undergoes in ensuring the security in computer networks in information Technology units of
Technovy region.
1 Applied social sciences research methods series, explained on fowler article , on page 54
2 Classics in applied mathematics design and analysis of Experiments article by Peter. John, on page 22
3 Experimental Design Procedures for the Behavioural Sciences highlighted in his journal article, on page 27-30
4 Research methods Knowledge Base by Trochim in Cornell university websites
1
Methodology
3.1 Introduction
This study aims at reviewing the security issues in network through a method known as survey1.
A survey was conducted for Technovy information technology companies whose intention was
for studying some of the challenges to intrusion, may it be threats, attackers with a bad motive or
even the malicious softwares for detection security in information system networks. The survey
was conducted using a questionnaire method.
This research explores the applicability of data or information extracted techniques for detecting
intruders or attackers in all ways2. For investigation to be a success in this area an experiment
method was performed. Various experimentations using softwares that are machine controlled
were performed in determining the efficiency of methods used for detecting intruders3. This
chapter will discuss in details the system development methodology, the feasibility study, facts
findings methods, data and system analysis methods and system specifications to be used in
developing the honeypot system4.
3.2 Statement of the Problem
One of the necessity of all IT companies is the security of the computer network with how it
expands. In security, factors which are critical in networks is detecting the intruders or attackers
on security of the computers. Detecting intruders has become a very challenging issue to deal
with as the connectivity increments in information systems and the services that they incorporate.
In this perspective “What are some of the encounters in detecting intruders attacking the security
in computer networks? Researcher pursues in studying the security issues in networks,
specifying the need of systems meant for detecting intruders and the challenges this system
undergoes in ensuring the security in computer networks in information Technology units of
Technovy region.
1 Applied social sciences research methods series, explained on fowler article , on page 54
2 Classics in applied mathematics design and analysis of Experiments article by Peter. John, on page 22
3 Experimental Design Procedures for the Behavioural Sciences highlighted in his journal article, on page 27-30
4 Research methods Knowledge Base by Trochim in Cornell university websites
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

This investigation is intended to determine the data mined techniques that assists in
strengthening the network security5. Major idea to be kept in mind is to know if that the mined
data can be used as a mechanism in detecting attackers and intruders with negative motives. The
execution of various experiments need to be executed. The experiments aim at finding out the
methods used in solving security issues in computer networks in an efficient manner. The major
idea of this study is providing a framework that has the capability in giving solutions for
challenges to intruders detected. The research Proposes to getting solutions for the following
study questions that arose while doing the investigations.
1. What are the challenges facing current systems for intruder’s detection?
2. What are the techniques which are effective in data mined for intruder’s detection?
3. Reason to why security in computer networks is very vital?
4. How to differentiate if the network traffic coming in is normal or intruded?
5. The role played by detecting intruders in computer network security?
3.3 Research Methodology
System development methodology refers to the framework that is used to structure, plan, and
control the process of developing an information system Linda Night, Theresa Steinbach and6. A
wide variety of such frameworks have evolved over the years, each with its own recognized
strengths and weaknesses. One system development methodology is not necessarily suitable for
use by all projects. Each of the available methodologies is best suited to specific kinds of
projects, based on various technical, organizational, project and team considerations.
This research will use survey, method in identifying the issues in network security and employ
the method of experimentation in constructing the framework7. This makes the study to relate
with NSM (network security mngt) which is a study with specific references to information
technology industrial units in Technovy region. In the study both the secondary and primary data
is gathered to determine the role of network security and the systems for detecting intruders.
Data that is primary is gathered through method known as survey where the secondary data is
gathered through unpublished material and unpublished material. The research methodology be
5 Design, innovation and discovery article name statistics for experiments by George Box highlighted from page 11
6 System Development Methodologies for Web Enabled E-Business website source by Kellen Vince
7 Survey Sampling on Wiley Inter Science article highlighted by Kish on page 47-56
2
strengthening the network security5. Major idea to be kept in mind is to know if that the mined
data can be used as a mechanism in detecting attackers and intruders with negative motives. The
execution of various experiments need to be executed. The experiments aim at finding out the
methods used in solving security issues in computer networks in an efficient manner. The major
idea of this study is providing a framework that has the capability in giving solutions for
challenges to intruders detected. The research Proposes to getting solutions for the following
study questions that arose while doing the investigations.
1. What are the challenges facing current systems for intruder’s detection?
2. What are the techniques which are effective in data mined for intruder’s detection?
3. Reason to why security in computer networks is very vital?
4. How to differentiate if the network traffic coming in is normal or intruded?
5. The role played by detecting intruders in computer network security?
3.3 Research Methodology
System development methodology refers to the framework that is used to structure, plan, and
control the process of developing an information system Linda Night, Theresa Steinbach and6. A
wide variety of such frameworks have evolved over the years, each with its own recognized
strengths and weaknesses. One system development methodology is not necessarily suitable for
use by all projects. Each of the available methodologies is best suited to specific kinds of
projects, based on various technical, organizational, project and team considerations.
This research will use survey, method in identifying the issues in network security and employ
the method of experimentation in constructing the framework7. This makes the study to relate
with NSM (network security mngt) which is a study with specific references to information
technology industrial units in Technovy region. In the study both the secondary and primary data
is gathered to determine the role of network security and the systems for detecting intruders.
Data that is primary is gathered through method known as survey where the secondary data is
gathered through unpublished material and unpublished material. The research methodology be
5 Design, innovation and discovery article name statistics for experiments by George Box highlighted from page 11
6 System Development Methodologies for Web Enabled E-Business website source by Kellen Vince
7 Survey Sampling on Wiley Inter Science article highlighted by Kish on page 47-56
2

applied in this context elaborates on how to obtain the whole sample and randomly choosing a
sample size for the survey and experimentation8.
To develop the system, Rapid Application Development (RAD) which is one of these system
development frameworks will be used.
3.3.1Rapid Application Development
Rapid Application Development (RAD) is an incremental software process model that
emphasizes a short system development cycle. It compresses the step-by-step development of
conventional methods into an iterative process9. The RAD approach thus includes developing
and refining the data models, process models, and prototype in parallel using an iterative process.
User requirements are refined, a solution is designed, the solution is prototyped, the prototype is
reviewed, user input is provided, and the process begins again. RAD is therefore flexible and
adaptable to changes thus making it easier to change requirements.
RAD consists of various phases during software development process. These phase are discussed
in details below.
1. Requirement planning phase
This phase will provide a thorough
analysis of the information system
security including the attack, the
threats, and malwares and how the
honeypot system will ensure that the
elicited requirements are clear, complete, consistent, and unambiguous and would help in
resolving the honeypot system. Here the researcher proposes the use of online questionnaires and
Skype interviews for finding requirements from the users who uses the computers and all devices
8 Research Methodology, Methods and techniques on article by Kothari pages 45-78
9 A decision-making framework for management article by Cavalieri pages p. 379-396.
3
sample size for the survey and experimentation8.
To develop the system, Rapid Application Development (RAD) which is one of these system
development frameworks will be used.
3.3.1Rapid Application Development
Rapid Application Development (RAD) is an incremental software process model that
emphasizes a short system development cycle. It compresses the step-by-step development of
conventional methods into an iterative process9. The RAD approach thus includes developing
and refining the data models, process models, and prototype in parallel using an iterative process.
User requirements are refined, a solution is designed, the solution is prototyped, the prototype is
reviewed, user input is provided, and the process begins again. RAD is therefore flexible and
adaptable to changes thus making it easier to change requirements.
RAD consists of various phases during software development process. These phase are discussed
in details below.
1. Requirement planning phase
This phase will provide a thorough
analysis of the information system
security including the attack, the
threats, and malwares and how the
honeypot system will ensure that the
elicited requirements are clear, complete, consistent, and unambiguous and would help in
resolving the honeypot system. Here the researcher proposes the use of online questionnaires and
Skype interviews for finding requirements from the users who uses the computers and all devices
8 Research Methodology, Methods and techniques on article by Kothari pages 45-78
9 A decision-making framework for management article by Cavalieri pages p. 379-396.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

especially those that uses the internet. This method will reduce the travelling cost as well as the
time spend in gathering these requirements.
2.User design phase: This will be done by use of UML diagrams such as use case, class
diagrams and activity diagrams. The use case will show all the interactions between the actors of
the system, that is all the actors of the honeypot system itself. The class diagram will show
various relationship existing between the system’s components 10. Also the activity diagram will
be used to show all the tasks involved both at the front end and the back end part of the system.
With the use of these diagrams users will have a clear overview of the physical and logical
design of the honeypot system, make modifications and eventually approve a working model that
suits their requirements.
3. Construction phase: This is an implementation phase in which the proposed system being
honeypot system will be developed from the design phase to a fully functional system. This
phase will consist tasks such as coding, unit integration and system testing of the proposed
system based on the user’s requirements. The proposed system being application will be
developed using the following programming language and the installation platform php version
5.3.4 or higher and the following packages: python-dev, python-openssl, python-pyasn1,
python-twisted. Kippo honeypot is an open source software written in python language.
4.Transition phase:
Here the various testing will be carried out before the system is handed over for use. The tests
include a unit testing, this involve testing of the individual component of the system source code
of the system. Also a system testing for the whole system will be carried out to ensure that it
functionality suits the specified objectives and requirements before it is handed over for use.
3.3.1.1RAD Justification
Fast development and low cost. With RAD the System will be developed faster and at low cost
thus making the development process less expensive in time and cost.
Extensive user involvement. The prototypes used for Honeypot System gives users’ tangible
descriptions on what to judge and this enhances extensive user participation allowing them to
10 Implementing total productive maintenance by Lycke article on page 3-7
4
time spend in gathering these requirements.
2.User design phase: This will be done by use of UML diagrams such as use case, class
diagrams and activity diagrams. The use case will show all the interactions between the actors of
the system, that is all the actors of the honeypot system itself. The class diagram will show
various relationship existing between the system’s components 10. Also the activity diagram will
be used to show all the tasks involved both at the front end and the back end part of the system.
With the use of these diagrams users will have a clear overview of the physical and logical
design of the honeypot system, make modifications and eventually approve a working model that
suits their requirements.
3. Construction phase: This is an implementation phase in which the proposed system being
honeypot system will be developed from the design phase to a fully functional system. This
phase will consist tasks such as coding, unit integration and system testing of the proposed
system based on the user’s requirements. The proposed system being application will be
developed using the following programming language and the installation platform php version
5.3.4 or higher and the following packages: python-dev, python-openssl, python-pyasn1,
python-twisted. Kippo honeypot is an open source software written in python language.
4.Transition phase:
Here the various testing will be carried out before the system is handed over for use. The tests
include a unit testing, this involve testing of the individual component of the system source code
of the system. Also a system testing for the whole system will be carried out to ensure that it
functionality suits the specified objectives and requirements before it is handed over for use.
3.3.1.1RAD Justification
Fast development and low cost. With RAD the System will be developed faster and at low cost
thus making the development process less expensive in time and cost.
Extensive user involvement. The prototypes used for Honeypot System gives users’ tangible
descriptions on what to judge and this enhances extensive user participation allowing them to
10 Implementing total productive maintenance by Lycke article on page 3-7
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

provide their suggestions and requirements thus enabling the development of a system that suits
the users need. Also with RAD it is easier to make requirements changes to the system.
3.4 Fact Finding Approach
Under facts finding section, the following will be discussed: research design, Target population
and data collection methods11. All these will help in finding the requirements of the proposed
Honeypot System.
3.4.1 Primary Data
This is data gathered through the method referred to as Survey. This specific data is very original
and in its own nature. This data is gathered by distribution of questionnaire and having them
filled by the sample size selected that is the respondents who are concerned, for this context,
questionnaires were administered online whereas the manual methods were also used. Telephone
interview and one-on-one interview were conducted with the information Technology people of
Technovy region.
3.4.2 Sample Design
A sample design is a process whereby a specific plan is designed for the reason of coming up
with a sample size from the population12. For the serving the purpose of the study subject, the
researcher has chosen 30 sample units as respondents13. Technique like sampling is used in
purposive quota and convenience sampling in determining the solution we are seeking for.
Sample target for the study is information technology industrial units from Technovy Region.
The size of sample population is 200 information technology industries. The sampling frame was
applied in the study for 30 information Technology industrial units.
11 Design and analysis article by Keppel
12 computer graphics, sampling and interactive techniques on the article sampling techniques pages 41-117 by
Eveach
13 sampling design & techniques article by Lohr
5
the users need. Also with RAD it is easier to make requirements changes to the system.
3.4 Fact Finding Approach
Under facts finding section, the following will be discussed: research design, Target population
and data collection methods11. All these will help in finding the requirements of the proposed
Honeypot System.
3.4.1 Primary Data
This is data gathered through the method referred to as Survey. This specific data is very original
and in its own nature. This data is gathered by distribution of questionnaire and having them
filled by the sample size selected that is the respondents who are concerned, for this context,
questionnaires were administered online whereas the manual methods were also used. Telephone
interview and one-on-one interview were conducted with the information Technology people of
Technovy region.
3.4.2 Sample Design
A sample design is a process whereby a specific plan is designed for the reason of coming up
with a sample size from the population12. For the serving the purpose of the study subject, the
researcher has chosen 30 sample units as respondents13. Technique like sampling is used in
purposive quota and convenience sampling in determining the solution we are seeking for.
Sample target for the study is information technology industrial units from Technovy Region.
The size of sample population is 200 information technology industries. The sampling frame was
applied in the study for 30 information Technology industrial units.
11 Design and analysis article by Keppel
12 computer graphics, sampling and interactive techniques on the article sampling techniques pages 41-117 by
Eveach
13 sampling design & techniques article by Lohr
5

3.4.3 Region Selection
The researcher has applied method of purposive sampling in selecting the study Region.
Technovy region has been selected by researcher as it is an attractive place where many IT
specialists meets for information technology industrial units. Information Technologies
industries are developing in Technovy region due to its close proximity to Moscow, hence the
rapid growth of infrastructures. Also emergence of many institutions for education and
universities also have played a part in the growth of this information technology industries.
Technovy Region is an information technology hub making it one of the leading industrial ICT
companies having branch in Technovy. Due to its leading through ICT many companies have
been located and emerging in Technovy region.
3.4.4 Respondent Selection
The selected respondents are selected for only those working in the ICT industry and those with
more than three years of work experience. The researcher selection is based on those who
entirely works on the network security or related such projects. The questionnaire prepared is
filled by all the respondents selected. Questionnaire is manually filled or done and sent via the
email. The questionnaire sent by email might have been softcopy filled and sent or might have
been filled manually, scanned and then sent as a document via email. Also it’s good to note that
using this all selected respondents are interviewed personally or via a telephone interview.
3.4.5 Secondary Data
This is data applied in studying the network security that is provided by various systems of
detecting intruders that are available in the current market. The main aim of secondary data is
finding the features and demerits of present intrusion detection systems products in sale. This
data which is secondary is gathered from articles, sources such as websites, journals that are
reputed, and the documentation of the product.
6
The researcher has applied method of purposive sampling in selecting the study Region.
Technovy region has been selected by researcher as it is an attractive place where many IT
specialists meets for information technology industrial units. Information Technologies
industries are developing in Technovy region due to its close proximity to Moscow, hence the
rapid growth of infrastructures. Also emergence of many institutions for education and
universities also have played a part in the growth of this information technology industries.
Technovy Region is an information technology hub making it one of the leading industrial ICT
companies having branch in Technovy. Due to its leading through ICT many companies have
been located and emerging in Technovy region.
3.4.4 Respondent Selection
The selected respondents are selected for only those working in the ICT industry and those with
more than three years of work experience. The researcher selection is based on those who
entirely works on the network security or related such projects. The questionnaire prepared is
filled by all the respondents selected. Questionnaire is manually filled or done and sent via the
email. The questionnaire sent by email might have been softcopy filled and sent or might have
been filled manually, scanned and then sent as a document via email. Also it’s good to note that
using this all selected respondents are interviewed personally or via a telephone interview.
3.4.5 Secondary Data
This is data applied in studying the network security that is provided by various systems of
detecting intruders that are available in the current market. The main aim of secondary data is
finding the features and demerits of present intrusion detection systems products in sale. This
data which is secondary is gathered from articles, sources such as websites, journals that are
reputed, and the documentation of the product.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3.4.6 Questionnaire
The aim of administering a questionnaire is procuring information, about how necessary and
importance of computer network security measures14. The questionnaire designed is specifically
for security of networks, hence further collecting info about the needs of the intruders detecting
systems and hence investigating the encounters in the current detecting systems for intruders.
The Questionnaire is created with Likert scale15.
3.5 System Requirements Analysis
3.5.1 Non-Functional Requirements
Usability-The system should be user friendly and easier to navigate all through from the end
user and to the front end.
Availability. The system should be accessible by the users at the right time. The detected
intruders should be prevented before they take action in disclosing the confidentiality or
insecurity of information when accessed by people who are have no authorization.
Scalability. The Kippo honeypot system should allow future additional functionalities if need be.
3.5.2 Functional Requirements.
These are the visible features or requirements that we interact with directly. In the case of the
Kippo honeypot system the system most basic requirements which are functional are as follows
1.Kippo Honeypot system should analyze the most used usernames inserted by the attackers in
order to gain access to the honeypot system.
2. Kippo Honeypot system should analyze the most used passwords inserted by the attackers to
the honeypot system.
3. Kippo Honeypot system should analyze the most typed commands by the attackers once they
gained access to the honeypot system and ''successfully'' inserted the username and password
combination. Thereafter, the honeypot system gives the idea to the attacker that has inserted an
operating system as a command line interface appears.
14 Evaluation capacity building in complex organizations on the article “Program Evaluation in a Complex
Organizational System: Lessons from Cooperative Extension” by Taylor- Powell on pages 227-331
15 Springer Science Business Media B.V. article named “Likert scales, levels of measurement and the laws of
statistics”, by Likert on pages 5-27
7
The aim of administering a questionnaire is procuring information, about how necessary and
importance of computer network security measures14. The questionnaire designed is specifically
for security of networks, hence further collecting info about the needs of the intruders detecting
systems and hence investigating the encounters in the current detecting systems for intruders.
The Questionnaire is created with Likert scale15.
3.5 System Requirements Analysis
3.5.1 Non-Functional Requirements
Usability-The system should be user friendly and easier to navigate all through from the end
user and to the front end.
Availability. The system should be accessible by the users at the right time. The detected
intruders should be prevented before they take action in disclosing the confidentiality or
insecurity of information when accessed by people who are have no authorization.
Scalability. The Kippo honeypot system should allow future additional functionalities if need be.
3.5.2 Functional Requirements.
These are the visible features or requirements that we interact with directly. In the case of the
Kippo honeypot system the system most basic requirements which are functional are as follows
1.Kippo Honeypot system should analyze the most used usernames inserted by the attackers in
order to gain access to the honeypot system.
2. Kippo Honeypot system should analyze the most used passwords inserted by the attackers to
the honeypot system.
3. Kippo Honeypot system should analyze the most typed commands by the attackers once they
gained access to the honeypot system and ''successfully'' inserted the username and password
combination. Thereafter, the honeypot system gives the idea to the attacker that has inserted an
operating system as a command line interface appears.
14 Evaluation capacity building in complex organizations on the article “Program Evaluation in a Complex
Organizational System: Lessons from Cooperative Extension” by Taylor- Powell on pages 227-331
15 Springer Science Business Media B.V. article named “Likert scales, levels of measurement and the laws of
statistics”, by Likert on pages 5-27
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3.6 Hypothesis Testing
Testing the hypothesis is a process of accepting or rejecting the hypothesis. The main aim of
hypothesis is recognizing and identifying facts which are relevant and also giving directions to
study of the research. In this research study the hypothesis test was done using percentage.
3.6 Limitations of Study
Technovy region is an information technology hub and the researcher being from Technovy
region, the study is only in this region specific and limited to it. Everything and any conclusions
drawn is limited to the Technovy region only.
_This study will simply deal with intruders detecting components of computer security.
_This study is primarily concentrated on PC and network management systems. Its purpose is
to offer a method of detecting security attacks. The proposed honeypot system is used as way
to prevent the intrusions.
References
(n.d.).
8
Testing the hypothesis is a process of accepting or rejecting the hypothesis. The main aim of
hypothesis is recognizing and identifying facts which are relevant and also giving directions to
study of the research. In this research study the hypothesis test was done using percentage.
3.6 Limitations of Study
Technovy region is an information technology hub and the researcher being from Technovy
region, the study is only in this region specific and limited to it. Everything and any conclusions
drawn is limited to the Technovy region only.
_This study will simply deal with intruders detecting components of computer security.
_This study is primarily concentrated on PC and network management systems. Its purpose is
to offer a method of detecting security attacks. The proposed honeypot system is used as way
to prevent the intrusions.
References
(n.d.).
8

(n.d.).
8(Kothari C. R. (2014). New Delhi: New age International (p) Ltd. Research Methodology, Methods and
techniques, 45-78.
14(Taylor-Powell E. (2008). Program Evaluation in a Complex Organizational System: Lessons From
Cooperative Extension. Evaluation capacity building in complex organizations, 227-331.
9Cavalieri, S. G. (2008). Production Planning & Control. A decision-making framework for management,
19, p. 379-396.
12Eveach.LJ.Guibas. (2011). computer graphics ,sampling and interactive techniques. sampling
techniques, 54-117.
1Fowler. (2008). Surevey research methods. applied social sciences research methods series, 1, 54.
6George.E.P.Box. (2011). statistics for experimenters. design,innovation and discovery, 2, 11.
7Kellen, V. (2011). A Customization; Linda Night, Theresa Steinbach and Vince Kellen; November 2001.
Retrieved from System Development Methodologies for Web Enabled E-Business:: [http://www.
Kellen.net/SysDev.htm].
11keppel.G. (2014). Design and analysis.
Kirk. ( 2015).
3Kirk. (2011). Experimental Design Procedures for the Behavioral Sciences, 27-30.
Kish.L. (2011). Survey Sampling. wiley Inter Science, 47-56.
13Lohr.S.L. (2009). sampling design & techniques. sampling.
10Lycke, L. (2012). Implementing total productive maintenance. 3-7.
15Norman, G. (2010). “Likert scales, levels of measurement and the laws of statistics”,. Springer Science
Business Media B.V., 5-27.
2Peter.W.M.John. (2012). Statistical design and analysis of Experiments. Classics in applied mathematics,
22.
4Trochim, W. (2012). Research methods Knowledge Base. Retrieved from cornell university:
http://trochim.human.cornell.edu/kb/index.htm
9
8(Kothari C. R. (2014). New Delhi: New age International (p) Ltd. Research Methodology, Methods and
techniques, 45-78.
14(Taylor-Powell E. (2008). Program Evaluation in a Complex Organizational System: Lessons From
Cooperative Extension. Evaluation capacity building in complex organizations, 227-331.
9Cavalieri, S. G. (2008). Production Planning & Control. A decision-making framework for management,
19, p. 379-396.
12Eveach.LJ.Guibas. (2011). computer graphics ,sampling and interactive techniques. sampling
techniques, 54-117.
1Fowler. (2008). Surevey research methods. applied social sciences research methods series, 1, 54.
6George.E.P.Box. (2011). statistics for experimenters. design,innovation and discovery, 2, 11.
7Kellen, V. (2011). A Customization; Linda Night, Theresa Steinbach and Vince Kellen; November 2001.
Retrieved from System Development Methodologies for Web Enabled E-Business:: [http://www.
Kellen.net/SysDev.htm].
11keppel.G. (2014). Design and analysis.
Kirk. ( 2015).
3Kirk. (2011). Experimental Design Procedures for the Behavioral Sciences, 27-30.
Kish.L. (2011). Survey Sampling. wiley Inter Science, 47-56.
13Lohr.S.L. (2009). sampling design & techniques. sampling.
10Lycke, L. (2012). Implementing total productive maintenance. 3-7.
15Norman, G. (2010). “Likert scales, levels of measurement and the laws of statistics”,. Springer Science
Business Media B.V., 5-27.
2Peter.W.M.John. (2012). Statistical design and analysis of Experiments. Classics in applied mathematics,
22.
4Trochim, W. (2012). Research methods Knowledge Base. Retrieved from cornell university:
http://trochim.human.cornell.edu/kb/index.htm
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




