1Manganaris S, Christensen M, Zerkie D, et al. Data mining analysis of RTID aarms[J]. Computer Networks, 2000,34(4): 571 -577.
2Alien J, Christie A, Fithen Wetal. State of the practice of intrusion detection technologies [R].technical report (CMU/SEI-99- TR-028), January 2000.
3Briney. A New Direction in Intrusion Detection. http://www. infosecuritymag. com, August, 2001.
4S.Staniford--Chen, Tung B, Schnackenberg D. The common intrusion detection framework(CiDF)[M]. The information survivability workshop. Orlando FL,1998.
5The BSD Dacket filter: a new architecture for user-level packet capture[A]. McCanne S, Jacobson V. Proceedings of the 1993 Winter USENIX Technical Conference[C]. San Diego: CA, 1993,37-39.
6Snort-Lightweight Intrusion Detection for Networks[A]. Martin Roesch. USENIX LISA Conference,November 1999.