郑军,胡铭曾,云晓春,张宏丽. 基于SOFM和快速最近邻搜索的网络入侵检测系统与攻击分析. 计算机研究与发展, 2005-9, 42(9): 1578-1586. Zheng Jun, Hu Ming-zeng, Yun Xiao-chun, and Zhang Hong-li. Network intrusion detection and attack analysis based on SOFM with fast nearest-neighbor search. Computer Research and Development, 2005, 42(9): 1578-1586.[2]Bierman E, Cloete E, and Venter L M. A comparison of intrusion detection systems[J].Computers Security.2001, 20(8):676-683[3]Lee W, Miller M, Stolfo S, Jallad K, Park C, Zadok E, and Prabhakar V. Toward cost-sensitive modeling for intrusion detection. Technical Report CUCS-002-00, Computer Science, Columbia University, 2000.[4]Mukkamala S and Sung A H. Identifying significant features for network forensic analysis using artificial intelligent techniques. International Journal of Digital Evidence, 2003, 1(4): 1-17.[5]Srilatha Chebrolu, Ajith Abraham, and Johnson P. Thomas[J].Feature deduction and ensemble design of intrusion detection system. Computer Security.2005, 24(4):295-307[6]邹涛,孙宏伟,田新广,李学春. 入侵检测系统中两种审计数据缩减技术的比较与分析.计算机应用,2003, 23(7): 13-17. Zou Tao, Sun Hong-wei, Tian Xin-guang, and Li Xue-chun. Comparison and analysis of two audit data reduction methods for intrusion setection system. Computer Applications, 2006, 23(7): 13-17.[7]Lippmann R, Haines J W, Fried D J, Korba J, and Das K. The 1999 DARPA off-line intrusion detection evaluation[J].Computer Networks.2000, 34(4):579-595
|