4R Heady, G Luger, A Maccabe et al. The architecture of a network level intrusion detection system [R]. Technical Report CS90-20, University of New Mexico, Department of Computer Science, August 1990.
5Denning D E. An intrusion detection model[J]. IEEE Transactions on Software Engineering, February 1987 ,SE-13,222-232.
6Common vulnerabilities and exposures, version 20030402[EB/OL]. http://cve. mitre. org, March 2004.
7Northcutt S, Cooper M, Fearnow Met al. Intrusion signatures and analysis[M]. US: New Riders, 2001.
8Security focus vulnerability database [EB/OL]. http ://www.securityfocus. com/bid, March 2004.
9Arachnids [EB/OL]. http://www. whitehats.com/ids/index.html, March 2004.
10CERT(r) incident note IN-2004-01[EB/OL]. http://www.cert. org/incident-notes/IN-2004-01. html, March 2004.