5[1]Kumar S. Classification and detection of computer intrusions [D]. West Lafayetle: School of Liberal Arts Purdue University, 1995.
6[2]Ghosh A K, Schwartzbard A. A study in using neural networks for anomaly and misuse detection[Z]. The 8th USENIX Security Symposium, Washington,1999.
7[4]Snapp S. DIDS (distributed intrusion detection system ) - Motivation, architecture and early prototype [Z]. The 14th National Computer Security Conference, Washington, 1991.
8[5]Cannady J. Artificial neural networks for misuse detection[Z]. The 21st National Information Systems Security Conference, Arlington, 1998.
9[6]Dittrich D. Distributed denial of service (DDoS)attacks/tools [EB/OL ]. http: // staff. washington.edu/dittrich/misc/ddos/, 2003-09-06/2003-09-14.
10[8]Lee W K. A data mining framework for constructing features and models for intrusion detection systems[D]. New York: Graduate School of Arts and Sciences, Columbia University, 1999.