5Sophos Company. Sophos threat report July 2008 [ EB/OL ]. http ://www. sophos, com/security/whitepapers, March 2009.
6McAfee SiteAdvisor. The working principle of SiteAdvisor[ EB/ OL]. http://www, siteadvisor, com/howitworks/index, html, March 2009.
7Ikinci A, Holz T, Freiling F. Monkey-spider: detecting malicious websites with low-interaction honeyclients [ C ]. Proceedings of Sicherheit 2008, April 2008, 407-421.
8Szor P. The art of computer virus research and defense [M]. Addison-Wesley Professional, 2005.
9Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequence of system calls [ J]. Journal of Computer Security, 1998, 6 : 151-180.
10Lane T, Brodley C E. Temporal sequence learning and data reduction for anomaly detection [J].ACM Transactions on Information and System Security, 1999,2( 3 ) :295-331.