Maxion R A,Tan K M C.Benchmarking anomaly-based detection systems[A].Dependable Systems and Networks,2000. Proceedings International Conference[C].2000.623-630.
[3]
Nicholas J Puketza,Kui Zhang.A methodology for testing intrusion detection systems[J].IEEE Trans Software Eng,1996,22(10):719-729.
[4]
Denning D E.An intrusion-detection model[J].IEEE Trans Software Eng,1987,13(2):222-232.
[5]
Koral Ilgun,Richard A K.State transition analysis:a rule-based intrusion detection approach[J].IEEE Trans Software Eng,1995,21(3):181-199.
[6]
胡守仁.神经网络导论[M].北京:国防科技大学出版社, 1997.
[7]
Sinclair C,Pierce L.An application of machine learning to network intrusion detection[A].Computer Security Application Conference,1999.Proceedings.15th Annual[C].1999.371-377.