[1] 胡华平, 陈海涛, 黄辰林, 唐勇, HU Hua-ping, CHEN Hai-tao, HUANG Chen-lin, TANG Yong. 入侵检测系统研究现状及发展趋势 [J]. 计算机工程与科学 2001.doi:10.3969/j.issn.1007-130X.2001.02.006 [2] 马恒太, 蒋建春, 陈伟锋, 卿斯汉, MA Heng-tai, JIANG Jian-chun, CHEN Wei-feng, QING Si-han. 基于Agent的分布式入侵检测系统模型 [J]. 软件学报 2000. [3] 李镇江, 戴英侠, 陈越, LI Zhenjian, Dai Yingxia, CHEN Yue. IDS入侵检测系统研究 [J]. 计算机工程 2001.doi:10.3969/j.issn.1000-3428.2001.04.003 [4] 连一峰, 戴英侠, 胡艳, 许一凡. 分布式入侵检测模型研究 [J]. 计算机研究与发展 2003. [5] 蒋建春, 马恒太, 任党恩, 卿斯汉, JIANG Jian-chun, MA Heng-tai, REN Dan-gen, QING Si-han. 网络安全入侵检测:研究综述 [J]. 软件学报 2000. [6] Rebecca Gurley Bace, 陈明奇, 吴秋新. 入侵检测 [M]. 北京:人民邮电出版社 2001. [7] Stuart Staniford Chen. Common intrusion detection framework [OL]. http://seclab. cs. ucdacis. edu/cidf 2002. [8] Ning P, WANG X, JAJODIA S. Modeling requests among cooperating intrusion detection systerm [J]. Computer Communications 2002, 23(07). [9] White G.B., Fisch E.A.. Cooperating security managers: a peer-based intrusion detection system [J]. IEEE Network: The Magazine of Computer Communications 1996, 1(1). [10] Kevin Richards. Network Based Intrusion Detection: A Review of Technologies [J]. Computers & Security 1999, 8(8). [11] Eugene H. Spafford, Diego Zamboni. Intrusion detection using autonomous agents [J]. Computer networks 2000, 4(4). [12] 韩东海, 王超, 李群. 入侵检测系统及实例剖析 [M]. 北京:清华大学出版社 2002. [13] Newman D, GIORGIS T, YAVARI-ISSALOU F. Intrusion detection system:suspicious finds [J]. Data Communications 1998, 27(11). |