2Lin Shih-Wei, Ying Kuo-Ching, Chen Shih-Chieh, Lee Zne-Jung. Particle swarm optimization for parameter de- termination and feature selection of support vector ma- chines [J]. Expert Systems with Applications, 2008,35(4): 1817-1824.
3K. Srujan Raju. Significance of Genetic'Algorithm in In- trusion Detection System [J]. International Journal of Computer Science and Security (IJCSS), 2011,5(3): 1-8.
4Denning D E. An intrusion dctection model[J]. IEEE Trans- actions on Software Engineering, 1987,13 (2) : 222- 232.
5Sommer R, Paxson V. Outside the closed world: On using machine learning for network intrusion detection[C]//Proc of 2010 IEEE Symposium on Security and Privacy, 2010: 305-316.
6Sommer R, Balzarotti D. Recent advances in intrusion detec- tion[C]//Proc of RAID' 1 1, 2011 : 1.
7Yang Ji-su, Kang B J, Kim H S, eta]. An efficient signature detection method using N-Gram indexing for intrusion detec- tion system[J]. Journal of Security Engineering, 2012,9 ( 1 ) : 1-14.
8Shon T, Kim Y, Lee C, et al. A machine learning frame- work for network anomaly detection using SVM and GA[C] //Proc of 2005 IEEE Workshop on Information Assurance and Security, 2005 : 176-183.
9Kim D S, Nguyen H N, Park J S. Genetic algorithm to im- prove SVM based network intrusion detection system[C]// Proc of the 19th International Conference on Advanced Infor- mation Networking and Applications, 2005:155-158.
10Scherer P, Vieher M, Drhzdilovfi P, et al. Using svm and clustering algorithms in ids systems[C]//Proc of Dateso' 11, 2011 : 109-119.