1[1]Allen, J., Christie, A., Fithen, W., et al. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028, 2000. http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028abstract.html.
2[2]Stevens, W.R. Unix Network Programming (Vol.1) Networking APIs: Sockets and XTI(2nd ed.). Prentice Hall PTR., 1998.
3[3]Roesch, M. Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA'99 Conference. http://www.usenix.org/events/lisa99/full_papers/roesch/roesch.pdf
4[4]Denial of Service Attacks. http://www.cert.org/tech_tips/denial_of_service.html.
5Spafford E H,Zamboni D.Intrusion Detection Using Autonomous Agents[J].Computer Networks,2000,34:547-570.