2Mitchell T M. Machine learning [M]. [S.l.] : McGraw-Hill Education, 1997.
3Mitchell T M. Does machine learning really work? [ J]. AI Magazine, 1997,18(3) :11-20.
4Frank J. Machine learning and intrusion detection:current and future directions [ C ]//Proceedings of the National 17th Computer Security Conference, 1994.
5Dunnigan T, Ostrouchov G. Flow characterization for intrusion detection[ R/OL]. ( 2001 - 11 ). Oak Ridge National Laboratory. http:// www. csm. oml.gov/~ost/id/tm. ps.
6Roughan M, Sen S, Spatscheck O, et al. Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification [ C ]//ACM SIGCOMM Internet Measurement Workshop 2004 ,Taormina, Sicily, Italy ,2004.
7McGregor A, Hall M, Lorier P, et al. Flow clustering using mathine learning techniques [ C]//Passive & Active Measurement Workshop 2004 ( PAM 2004), France, 19-20 April 2004.
8Soule A,Salamatian K,Taft N,et al. Flow classification by histograms or how to go on safari in the intcrnet [C]//ACM Sigmctrics, New York, USA, June 2004.
9Zander S, Nguyen T, Armitage G. Self-learning IP traffic elassification based on statistical flow characteristics [ C ]//Passive & Active Measurement Workshop(PAM) 2005, Boston, USA, March/April 2005.
10Zuev D, Moore A. Traffic classification using a statistical approach [C]// Passive & Active Measurement Workshop, Boston, USA, March/April 2005.