1DENNING D E,NEUMANN P G.Requirements and model for IDESA real-time intrusion detection system[R].USA:Computer Science Laboratory, SRI International, CA, 1985
2SEBRING M M,SHELLHOUSE,HANNA M E et al. Expert systems in intrusion detection:A case study[C].In:Proceeding of the 11th National Computer Security Conference,Baltimore,Maryland,1988:74~81
3LEE W.A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems[D].USA:Columbia University,1999
5Lane T,Brodley C E. An application of machine learning to anomaly detection. In:Proceedings of the 20th National Informa-tion Systems Security Conference,Baltimore Marylard, USA, 1997.366~377
6Kosoresow A P,Hofmeyr S A. A shape of self for UNIX processes. IEEE Software,1997,14(5):35~42
7Lee W,Stolfo S J. Data mining approaches for intrusion detection. In:Proceedings of the 7th USENIX Security Symposium,San Antonio, Texas, USA, 1998. 66~72