4Andress M.Surviving Security: How to Integrate People,Process and Technology[M].Beijing,China Machine Press.2002-01
5Snapp S R,Brentano J,Dias G V,et al.DIDS-- Motivation,Architecture,and An Early Prototype [C].Proceedings of 14th National Computer Security Conference,1991-10:167-176
6Hochberg J,Jackson K,Stallings C,et al.NADIR: An Automated System for Detecting Network Intrusion and Misuse[J].Computer Security,1993,12(3)
7Remmerer R A.NSTAT[R]: A Model-Based Real Time Network Intrusion Detection System.Technical Report TRCS97-18,Reliable Software Group,Department of Computer Science,1997
8Porras P P,Neumann P G .EMERALD: Event Monitoring Enabling Response to Anomalous Live Disturbances[C].The 20th National Information System Security Conference,1997:353-363
9Chen Staniford,Cheung S,Crawford R,et al.GRIDS: A Graph Based Intrusion Detection System for Large Networks[C].In Proceedings of the 19th National Information System Security Conference,1996,1:361-370
10Spafford E H,Zamboni D.Intrusion Detection Using Automomous Agents[J].Computer Networks,2000,34:547-570