1[1]Naji Habra, Baudouin Le Charilier, Isabelle Mathieu, Preliminary Report onAdvanced Security Audit Trail Analysis on Unix (ASAX also called SAT -X ). http://www. info. fundp. ac. be/~ amo/publications. html.
2[2]CCITT Recommendation X. 740 INFORMATION TECHNOLOGY - OPENSYSTEM INTEERCON NECTION- SYSTEM MANAGEMENT: SECURITYAUDIT TRAIL FUNCTION.
3[3]Wenke Lee and Salvatore J. Stolfo, Data Mining Approaches for IntrusionDetection, Computer Science Department, Columbia University.
4[4]David R. Saffort, Douglas Lee, and David K. Hess, The TAMU SecurityPackage: An Ongoing Response to Intemet Intruders in an AcademicEnvironment, Supercomputer Center,Texas A&M University.
8[8]Ye N,Emran S M,Chen Q,et al.Multivariate statistical analysis of audit trails for host-based intrusion detection[M].IEEE Transactions on Communications,2002.