1[1]Thomas H Ptacek, Timothy N Newsham.Insertion, Evasion,and Denial of Service:Eluding Network Intrusion Detection[J].Secure Networks,Inc.,1998,(1):3-17.
2[2]Julia Allen,Alan Christie,et al.State of the Practice of Intrusion Detection Technologies[J].Technical Report,Networked Systems Survivability Program,2000,(1):47-83.
3[3]Sandeep Kumar,Eugene H Spafford.A Pattern Matching Model for Misuse Intrusion Detection[C].REPORT in 17th National Computer Ecurity Conference,1994.3-9.