5CERT/CC Coordination Center.Trends in Denial of Service Attack Technology.October 2001
6Honig A.,Howard A.,Eskin E.,Stolfo S..Adaptive model generation:An architecture for the deployment of data miningbased intrusion detection systems.Data Mining for Security Applications,Kluwer,2002
7韩家炜等.数据挖掘-概念与技术.北京:高等教育出版社,2001
8Portnoy L.,Eskin E.,Stolfo S.J..Intrusion detection with unlabeled data using clustering.In:Proceedings of the ACM CSS Workshop on Data Mining Applied to Security (DMSA,2001),Philadelphia,PA,2001
9Ertoz L.,Eilertson E.,Lazarevic A.,Tan P.,Dokas P.,Srivastava J.,Kumar.Detection and summarization of novel network attacks using data mining.Technical Report,2003
10The 1999 DARPA Intrusion Detection Evaluation Data set,Information Systems Technology Group of MIT Lincoln Laboratory,http://www.ll.mit.edu/IST/ideval/data/data_index.html