1. Tang Z, Li J (2004) Intrusion detection technology. Tsinghua University Press, Beijing 1(6):112–115
2. Snort IDS (2012)
http://www.snort.org
, p 315
3. Liu G (2007) Research and improvement of Linux intrusion detection system. Southeast University, Nanjing 3(6):146–149
4. Lin G, Wang X (2007) Update snort system by using multithreaded technology. Xi’an Univ Electron Technol 4(6):887–894
5. Wang Y (2010) The PF_RING socket-based network packet capture technology. Softw Guide 5(9):168–169