1. Bauer D S, Koblentz M E. NIDX-an expert system for real-time network intrusion detection[C]//Proceedings of the Computer Networking Symposium. Washington D C: IEEE Press, 1988: 98–106.
2. Zhang Yirong, Xiao Shunping, Xian Ming, et al. An overview of intrusion detection techniques based on machine learning[J]. Computer Engineering and Applications, 2006, 42(2): 7–10(Ch).
3. Zhou Honggang, Yang Dechun. Anomaly detection approach based on immune algorithm and support vector machine[J]. Computer Applications, 2006, 26(9): 2145–2147 (Ch).
4. Rao Xian, Dong Chunxi, Yang Shaoquan. An intrusion detection system based on support vector machines[J]. Chinese Journal of Software, 2003, 14(4): 798–803(Ch).
5. Stolfo S J, Fan Wei, Prodromidis A, et al. KDD Cup 1999 Data [EB/OL]. [2010-12-26]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html .