1Kenneth D.Reed.Protocol Analysis,WB77.0[M].WestNet.Inc,2001 George Coulouris,Jean Dollimore,Tim Kindber.Distributed Systems Concepts and Design[M].Pearson Education,2001.
2J.P.Marques de Sa. Pattern Recognition Concepts,Methods and Applications [ M ].New York : Springer-Verlag, 2002.
3Douglas E.Comer,David LStevens.Intemetworking with TCP/IP Vol II :Design,Implementation,and Internals (Third Edition) [M ].Prentice-Hell.Inc, 1999.
4Tarck Abbes,Adel Bouhould,Michael Rusinowich. Protocol Analisis Intrusion Detection Using Decision.2004,1TCC/04.
5薛静锋 宁宇鹏 阎慧.入侵检测技采[M].北京:机械工业出版社,2004..
6美国国家安全局发布.信息保障技术框架(3.0版)[C].北京:北京中软电子出版社,2004..
7Denning.D.An Intrusion Detection Model.IEEE Transactions on Software Engineering.1987,13(2) :222-232.