[1] Denning D E. An Intrusion-detection Model[J]. IEEE Trans on Software Engineering, 1987, 13(2): 222-232.
[2] 杨海松, 李津生, 洪佩琳. 分布开放式的入侵检测与响应架构——IDRA[J]. 计算机学报, 2003, 26(9): 1177-1182.
Yang Haisong, Li Jinsheng, Hong Peilin. IDRA: a Distributed Open Intrusion Detection and Reaction Architecture[J]. Chinese Journal of Computers, 2003, 26 (9): 1177-1182.
[3] 俞研, 黄皓. 基于小样本标记实例的数据流集成入侵检测模型[J]. 电子学报, 2007, 35(2): 234-239.
Yu Yan, Huang Hao. A Streaming Ensemble Intrusion Detection Model Based on Small Labeled Data[J]. Acta Electronica Sinica, 2007, 35(2): 234-239.
[4] Mukherjee B, HeberLein T L, Levitt K N. Network Instrusion Detection[J]. IEEE Network, 1994, 8(3): 26-41.
[5] 蒋建春, 马恒太, 任党恩, 等. 网络安全入侵检测研究综述[J]. 软件学报, 2000, 11(11): 1460-1467.
Jiang Jianchun, Ma Hengtai, Ren Dang'en, et al. A Survey of Intrusion Detection Research on Network Security[J]. Journal of Software, 2000, 11 (11): 1460-1467.
[6] Reed K D. Protocol Analysis, WB77.0[M]. Westland: WestNet Inc, 2001: 118-122.
[7] Stevens W R. TCP/IP Illustrated, Volume 1: the Protocols[M]. Westland: Addison Wesley, 1994.
[8] 牟永敏, 李美贵, 梁琦. 入侵检测系统中模式匹配算法的研究[J]. 电子学报, 2006, 34(12): 2488-2490.
Mu Yongmin, Li Meigui, Liang Qi. The Survey of the Pattern Matching Algorithm in Intrusion Detection System[J]. Acta Electronica Sinica, 2006, 34(12): 2488-2490.
[9] Boyer R S, Moore J S. A Fast String Searching Algorithm[J]. Communication of the ACM, 1997, 20(10): 762-772. |