2Ptacek T H. Newsham T N. Insertion, Evasion, and Denial of Service: Eluding Network Intrudion detection[Z]. 1998.
3Ravi S. Sandhu. Authentication, access control, and intrusion detection[J], IEEF. Communications, 1994,32(9) :40 - 48.
4Denning D E. An Intrusion - detection model[J ],IEEE Transactions on software engineering, 1987,13(2) :222 - 231.
5Abdelaziz Mounji,Langtuages and Tools for Rule-Based Ditributed Intrusion Detection. The degree of Doctor of Computer Science Department of Facultes University,Belgioum, 1997.9.
6Techniques Adopted By ' System Grackers' When Attemption To Break Into Corporate or Sensitive Private Network[M]. By the consultants of the Network ,Security Solution Ltd. Front -line Information Security Team(Fist), 1998,12.
7蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
8High-Performance Communication Networks.Jean Walrand,Pravin Varaiya,2nd Edition,Morgan Kaufmann Publishers Inc.
9Reference Model for Firewall Technology and its Implications for Connection Signaling.J.Bryan Lyles and Christoph L.Schuba.Proceedings Open Signaling Workshop,Columbia University,NY,October 1996.
10Denning .D.An Inrusion Detection Model ,IEEE Transactions on Software Engineering,1987,13(2)222-232.