3Ptacek T H. Newsham T N. Insertion, Evasion, and Denial of Service: Eluding Network Intrudion detection[Z]. 1998.
4Ravi S. Sandhu. Authentication, access control, and intrusion detection[J], IEEF. Communications, 1994,32(9) :40 - 48.
5Denning D E. An Intrusion - detection model[J ],IEEE Transactions on software engineering, 1987,13(2) :222 - 231.
6Abdelaziz Mounji,Langtuages and Tools for Rule-Based Ditributed Intrusion Detection. The degree of Doctor of Computer Science Department of Facultes University,Belgioum, 1997.9.
7Techniques Adopted By ' System Grackers' When Attemption To Break Into Corporate or Sensitive Private Network[M]. By the consultants of the Network ,Security Solution Ltd. Front -line Information Security Team(Fist), 1998,12.
8Zemel T, Rossak W. Mega-Systems-the issue of advanced systems development [A]. Proceedings of the Second International Conference on Systems Integration[C]. Morristown, NJ, USA, 1992: 548-555.