2[3]Lippmann R;Cunningham R. Improving intrusion detection performance using keyword selection and neural network[C]. Proceedings. RAID'99,1999
3[4]Lee, S.C.; Heinbuch, D.V. Training a neural-network based intrusion detector to recognize novel attacks[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A, Volume: 31 Issue: 4 , July 2001, pp 294 -299
4[5]J Balasubramaniyan, J Omar Garcia-Fernandez, D Isacoff, E Spafford, D Zamboni. An architecture for intrusion detection using autonomous agents[C].Proceedings of the 14th Computer Security Applications Conference, 1998. pp 13-24
5[6]Frincke D, Don Tobin, Jesse McConnell et al. A framework for cooperative intrusion detection[C]. Proceedings of the 21st National Information Systems Security Conference, 1998, pp 361-373
6[7]Jungwon Kim; Bentley, P.J. Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator[C] .Proceedings of the 2001 Congress on Evolutionary Computation. Volume: 2 , 2001, pp1244 -1252
7[1]Julia Allen,Alan Christie,William Fithen et al. State of the Practice of Intrusion Detection Technologies.2000
8[2]An Introduction to Intrusion Detection& Assessment[M].ICSA,Inc
9[3]Network Based Intrusion Detection-A review of technologies[M].DENMAC SYSTEMS ,INC, 1999
10[4]Clifford Kahn,Phillip A Porras,Stuart Staniford Chen et al.A Common Intrusion Detection Framework.1998