l[1]Selection,
Combination, and Evaluation of Effective Software Sensors for Detecting
Abnormal Computer Usage KDD’04, August 22–25, 2004, Seattle,
Washington, USA.
l[2] Simple,
State-Based Approaches to Program-Based Anomaly Detection C. C. MICHAEL and
ANUP GHOSH Cigital Labs
l[3]Documents of Snort
l[4]Documents of Bro
l[5] Analysis and Mathematical
Justification of a Fitness Function used in an Intrusion
Detection System, Pedro A. DiazGomez, Dean F. Hougen
l[6]
http://www.ll.mit.edu/IST/ideval/index.html
l[7] Immunity-Based
Intrusion Detection System Design, Vulnerability Analysis, and
GENERTIA’s Genetic Arms Race, Haiyu Hou, Gerry Dozier
l[8]
Characterization of Network-Wide Anomalies in Traffic Flows, Anukool
Lakhina, Mark Crovella, Christophe
Diot
l[9] http://www.xfilt.com
l[11]
http://www.checkpoint.com
l
l
l
l
l
l
l
l
l
l
l