2Boyer R S,J S Moore.A fast string searching algorithm[J].Communications of the ACM,1977;20:762-772.
3S Wu,U Manber.A fast algorithm for multi-pattern searching[R].Technieal Report TR-94-17,University of Arizona,1994.
4K G Anagnostakis,E p Markatos.E2xB:A domainspeciflc string matching algorithm for intrusion detection[C].In:Proceedings of the 18th IFIP International Information Security Conference,2003.
5Aho A,Corasick M.Efficient string matching:an aid to bibliographic search[J].Comm ACM, 1975;18:33-40.
6Martin Roesch.Snort-lightweight intrusion detection for networks[C]. In:Proceedings of the 13th System Administration Conference,USENIX, 1999.
7MIT Lincoln Labs.DABPA Inttusion Detection Evaluation[DB].http://www.ll.mit.edu/IST/ideval, 1999.
8Lippmann R P, Fried D J, Graf I, et al. Evaluating Intrusion Detection Systems.. The 1998 DARPA Off-Line Intrusion Detection Evaluation. In:Proc. of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), Los Alamitos, CA, 2000,2:12-26