6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.
10Donghai Guan , Kejun Wang , Xiufen Ye , et al. A collaborative intrusion detection system using log server and neural networks[C]./ Proc. of the IEEE international Conference on Mechatronics & Automation. Niagara Falls , Canada ,2005.