1 蔡龙征,余胜生,周敬利.一种非纯净训练数据异常入侵检测方法.小型微型计算机系统, 2006,27(3):437-441.
2 Roesch M. Snort-Lightweight Intrusion Detection for Networks.Proc of LISA 99, 1999.
3 Mahoney M,Chan PK. PHAD:Packet Header Anomaly Detection for Identifying Hostile Network Traffic.Florida Tech. Technica1 Report 2001-04,http:// cs. fit.edu/~tr/
4 SPADE, Silicon Defense, http://www.silicondefense. com/software/spice/
5 Debra A, Lunt TF, et al. Detecting unusua1 program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES).Computer Science Laboratory SRI-CSL95- 06, May 1995. http://www.sdl.sri.com/papers/5/s/5sri/ 5sri.pdf
6 Wang K,Stolfo S.Anomalous payload-based network intrusion detection.In Recent Advances in Intrusion Detection,RAID 2004,September 2004:203-222.
7 Thorat SA, Khandelwal AK, Bezawada Bruhadeshwar, et al.Payload Content based Network Anomaly Detection. Applications of Digital Informa- tion and Web Technologies, 2008. ICADIWT 2008,First International Conference, 2008, 4-6 Aug:127-132.
8 Mahoney MV. Network traffic anomaly detection based on packet bytes. ACMSAC, 2003,1(13):21-38.