3[1]Lee Wenke, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999: 120-132
4[2]Basu R, Cunninghuam R H, Webster S E, et al. Detecting Low-profile Probes and Novel Denial-of-Service Attacks. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001-06
5[3]Staniford S, Hoagland J, McAlerney J. Practical Automated. Detection of Stealthy Portscans. ACM CCS IDS. Workshop, Athens, Greece,2000
6[4]Arkin O. Network Scanning Techniques. http://www.sys-security.com/archive/papers/Network_Scanning_Techniques.pdf, 1999-1 1
7[5]Fyodor. The Art of Port Scanning. Phrack 51, 1997-09
8[6]Fyodor. Remote OS Detection via TCP/IP Stack Fingerprinting. Phrack 54, 1998-12
9[7]Arkin O. ICMP Usage in Scanning. http://www.sys-security.com/archive/papers/ICMP_in_Scanning. pdf, 2000-12