5Richard A Kemmerer, Giovanni Vigna.Intrusion detection:A brief history and overview[C].Security and Privacy,2002.
6Anderson J P.Computer security threat monitoring and surveillance[R].Fort Washington,Pennsylvania:Anderson Co,1980.
7Denning D E. An intrusion detection model [J]. IEEE Transactions on Software Engineering,1987,13:222-228.
8Snort. Network intrusion detection system [EB/OL] .http:// www.snort.org.
9Varun Chandola, Eric Eilertson, Levent Ertoz, et al. MINDS: Architecture and design[R].Department of Computer Science, Minnesota University,2006.
10Wenke Lee,Sal Stolfo,Phil Chan,et al.Real time data mining-based intrusion detection [C]. Anaheim, CA: Proceedings of the 2001 DARPA Information Survivability Conference and Exposition (DISCEX II),2001.