5Yu-Sung Wu,Bingrui Foo,Yongguo Mei et al.Collaborative Intrusion Detection System(CIDS):A Framework for Accurate and Efficient IDS[C].In:Proceedings of the 19th Annual Computer Security Applications Conference(ACSAC 2003),2003.
6Tao Zou,Hongwei Sun,Xinguang Tian et al.Modeling A Self-learing Detection Engine Automatically for IDS[C].In:Proceedings of the 2003IEEE International Conference on Robotics,Intelligent System and Signal Processing,Changsha,China,2003.
7Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts[C].In:Proceedings of the 9th ACM Conference on Computer & Communications Security,Washington,USA:ACM Press,2002:245~254.
8Valdes A,Sknner K.Probabilistic alert correlation[C].In:Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection,Springer-Verlag,2001:54~68.
9Lee W,Stolfo S,Mok K.A data mining framework for adaptive intrusion detection.http://www.cs.columbia.edu/~sal/hpapers/framework.ps.gz.
10Lee W,Stolfo S J,Mok K.Algorithms for mining system audit data.http://citeseer.ist.psu.edu/lee99algorithms.html,1999.