[1] |
Anderson J P. Computer Security Threat Monitoring and Surveillance[DB/OL]. http://csrc.nist.gov/publications/history/ande80.pdf, 1980-02-26.
|
[2] |
Lee W, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models[C]// Proceedings of the 1999 IEEE Symposium on Security and Privacy. 1999:120-132.
|
[3] |
Proctor P E. Practical Intrusion Detection Handbook[M]. Prentice Hall, 2001.
|
[4] |
张博,李伟华,史兴键,等. IPv6环境下的入侵检测系统模型设计[J]. 西北工业大学学报, 2005,23(1):79-83.
|
[5] |
Julia Allen, Alan Christie, William Fithen, et al. State of the Practice of Intrusion Detection Technologies[R]. Carnegie Mellon University, 2000.
|
[6] |
Kumar S. Classification and Detection of Computer Intrusions[D]. Purdue University, 1995.
|
[7] |
蒋建春,马恒太,任党恩,等. 网络安全入侵检测:研究综述[J]. 软件学报, 2000,11(11):1460-1466.
|
[8] |
宋志鹏. 基于协议分析的网络入侵检测系统的研究与设计[D]. 济南:山东师范大学, 2007.
|
[9] |
景蕊,刘利军,怀进鹏. 基于协议分析的网络入侵检测技术[J]. 计算机工程与应用, 2003,39(36):128-133.
|
[10] |
Brian Caswell. Snort[EB/OL]. http://www.snort.org, 2013-09-19.
|
[11] |
Yao Guoxiang, Guan Quanlong, Lin Liangchao, et al. Research and implementation of next generation network intrusion detection system based on protocol analysis[C]// Proceedings of the 2008 International Colloquium on Computing, Communication, Control, and Management. 2008,2:353-357.
|
[12] |
Tamir Gal, Chris Morgan. SharpPcap: A Packet Capture Framework for .NET[EB/OL]. http://www.codeproject.com/Articles/12458/SharpPcap-A-Packet-Capture-Framework-for-NET, 2011-09-14.
|
[13] |
Shen Zihao, Wang Hui. Research on IPv6 intrusion detection system based on state protocol analysis[C]// Proceedings of the 2nd International Conference on Communication Systems, Networks and Applications. 2010,1:90-93.
|
[14] |
Shan Zheng, Chen Peng, Xu Ying, et al. A network state based intrusion detection model[C]// Proceedings of the 2011 International Conference on Computer Networks and Mobile Computing. 2001:481-486.
|
[15] |
Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[C]// Proceedings of the 2004 International Conference on Information Technology: Coding and Computing. 2004,1:404-408.
|
[16] |
谢希仁. 计算机网络(第5版)[M]. 北京:电子工业出版社, 2008.
|