1. RSA 2012 Cybercrime Trends Report, http://www.rsa.com.
2. Network Intrusion Detection;Stephen;New Riders,2003
3. Alaidaros H, Mahmuddin M, Mazari A. An Overview of Flow-Based and Packet-Based Intrusion Detection Performance in High Speed Networks.
4. Velarde-Alvarado, P., Vargas-Rosales, C, Toral-Cruz, H. and, Ramirez-Pacheco, J. An Information-theoretic Approach to Traffic Traces Sanitization for Intrusion Detection Purposes.
5. G. F. Cretu, A. Stavrou, M.E. Locasto, S.J. Stolfo, and A. D. Keromytis. Casting out Demons: Sanitizing Training Data for Anomaly Sensors. 2008. IEEE Computer Society.