1HANDLEY M, PAXSON V, KREIBICH C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics[A]. Proceedings of the 10th USENIX Security Symposium[C]. Washington D C, 2001. 159-167.
2MAHONEY M, CHAN P. Detecting Novel Attacks by Identifying Anomalous Network Packet Headers[R]. Technical Report CS-2001-2, Florida Institute of Technology, 2001.
3BETTATI R, ZHAO W, TEODOR D. Real-time intrusion detection and suppression[A]. Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring[C]. Santa Clara, CA, April 1999.
4COHEN W. Fast effective rule induction[A]. Proceedings of the Twelfth International Conference on Machine Learning[C]. Lake Tahoe, CA, 1995. 115-123.
5LIPPMANN R, et al. The 1999 DARPA Off-Line Intrusion Detection Evaluation[M]. Draft of Paper Submitted to Computer Networks, 2000. 1-20.
6ALLEN J, CHRISTIE A, FITHEN W, et al. State of the Practice of Intrusion Detection Technologies[R]. Carnegie Mellon University/Software Engineering Institute Technical Report CMU/SEI-99-TR-028, Jan 2000.