2Jakobson G,Weissman M D.Alarm correlation[J].IEEE Network.1993,7(6):52-59.
3Fayyad,Usama.Knowledge discovery in databases:an overview[Z].Lecture Notes in Artificial Intelligence,1997.
4Cen Xian—dao.Network management protocol and application developemnt[M].Beijing:Tsinghua University Press.1998.
5Agrawal R,Imielinski T,Swami A.Mining.association rules between sets of items in large databases[C].In:Buneman P,Jajodia S eds.Proceedings of ACM SIGMOD Corfference on Management of Data,New York:ACM,1993.
6Ptack TH, New Sham TN,Insertion ,Evasion and Denial of Service: Eluding Network Intrusion Detection,Secure Networks Inc, 1998
7Jeremy Frank, Artificial Intelligence and IntrusionDetection, Current and Future Directions, University ofCalifornia at Davis, June, 1994
8Atkinson R. Security Architecture for the InternetProtocol. RFC182 5,NRL,August 1995
9Michael Sobirey Richter ,Hartmut Konig, The Intrusion Detection System AID-Architecture and experiences in automated audit analysis .Proc. of IFIP SEC'95