2[1]Roesch M. Snort-Lightweight Intrusion Detection For Networks[EB/OL]. www.snort.org,1999-09.
3[2]Desai N. Increasing Performance in High Speed NIDS,A look at Snorts Internals[EB/OL]. http://www.cis.udel.edu/~zhi/www.docshow.net,2002-03.
4M Botha,Rvon Solms.Utilising fuzzy logic and trend analysis for effective intrusion detection[].Computers and Security.2003
5D Barbara,J Couto,S Jajodia,et al.Special section on data mining for intrusion detection and threat analysis:Adam:a test-bed for exploring the use of data mining in intrusion detection[].ACM SIGMOD Record.2001
6H Gunes Kayacik,A Nur Zincir-Heywood,Malcolm I Heywood.On the capability of an som based intrusion detection system[].Proceedings of the International Joint Conference on Neural NetworksIEEE.2003
7L Spitzner.Honeypot-Definitions and Value of Honeypots[]..2003
8M Bilodeau,D Brenner.Theory of multivariate statistics[]..1999
9P Z Hu,Malcolm I Heywood.Predicting intrusions with local linear model[].in Proceedings of the International Joint Con-ference on Neural NetworksIEEE.2003
4Wang P,Wu L,Cunningham R, et al. Honeypot detection in advanced botnet attacks[J]. International Journal of Information and Computer Security, 2010,4(1) .. 30 - 51.
5崇劫人.基于虚拟蜜网的入侵检测系统的研究[D].上海:上海交通大学,2010.
6Khattab S, Melhem R, Moss6D, et al. Honeypot back- propagation for mitigating spoofing distributed Denial-of- Service attacks [J]. Journal of Parallel and Distributed Computing, 2006,66(9):1152- 1164.
7Gupta A, Gupta S K, Ganesh I M, et al. Opaqueness characteristic of a context honeypot system [J]. Information Security Journal, 2010,19(3) .. 142 - 152.
8Marchese M, Surlinelli R, Zappatore S. Monitoring unauthorized internet accesses through a honeypot' system [J]. International Journal of Communication Systems, 2011,24(1) :75 - 93.
9Sardana A,Joshi R C, Kim T H, et al. Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: Honeypot based approach[J]. Journal of Intelligent Manufacturing, 2010,21(5) :623 - 634.
10Wicherski Georg. Placing a iow--interaction honeypot in- the-wild:A review of mwcollectd[J]. Network Security, 2010(3)..7-8.