6KRUEGEL C, TOTH T, Using Decision Trees to Improve Signature-based Intrusion Detection[ A], 6th Symposium on Recent Advances in Intrusion Detection ( RAID), Lecture Notes in Computer Science[ C]. Springer Verlag, USA, September 2003.
7FISK M, VARGHESE G. Fast Content-Based Packet Handling for Intrusion Detection[ R]. University of California at San Diego, La Jolla, CA, 2001.
8PAXSON V. A System for Detecting Network Intruders in Real-Time[ J]. Bro: a system for detecting network intruders in realtime[ J].Computer Networks, 1999, 31 (23/24) : 2435 - 2463.
9PAXSON V. The Bro 0.8 User Manual[ EB/OL]. http://www. icir.org/vem/bro-manual/, 2004 - 3 - 21.
10KRUEGEL C, TOTH T, Using Decision Trees to Improve Signature-based Intrusion Detection[ A], 6th Symposium on Recent Advancesin Intrusion Detection ( RAID), Lecture Notes in Computer Science[ C]. Springer Verlag, USA, September 2003,.