2Arbaugh W A, Fithen W L, McHugh J. Windows of vulnerability: A case study analysis [J]. IEEE Comput. 2000, 33 (12).
3Bace R G. Intrusion Detection [M]. Technology Series. Macmillan, London, 2000.
4Denning D E, Edwards D L, Jagannathan R, et al. A prototype IDES: A real- time intrusion detection expert system [C]. Technical report, Computer Science Laboratory [D]. SRI International, Menlo Park, 1987.
5Todd Heberlein L, Gihan Dias V, Karl Levitt N. et al. A Network security monitor [M] . 1991.