4Lee W K,Stolfo S J. Data Mining approaches for in- trusion detection [C]. Proc. the 7th USENIX Security Systems, 1998:26-29.
5Lee W K. A Data mining Framework for Constructing Features and Models for Intrusion Detection Systems [M ]. New Work. PhD thesis of Columbia University, 1999.
6Lee W K,Stolfo S J. A Framework for Constructing Features and Models for Intrusion Detection Systems [J]. ACM Transactions on Information and System Security,2001,3 (4): 227-261.
7Shin M,Moon H,Ryu K H,Applying Data Mining Techniques to Analyze Alert Data [C ]. Proc. the 5th Asia-Pa- cific Web Conference, 2003 : 33-47.
8Cabrera B D,Lewis P,Qin X Z,et al. Proactive In- trusion Detection and Distributed Denial of Service Attacks-A Case Study in Security Management[J]. Journal of Network and Systems Management, 2002 (10) : 225-254.
9Wang J,Zhen X,Liu Y B,et al. Intrusion Prevention in Depth System Research Based on Data Mining [J]. Interna- tional Journal of Distributed Sensor Networks, 2009 ( 1 ) : 22-27.
10Tavallaee M,Lu W,Ghorbani A A. Online Classifica- tion of Network Flows[C]. Proc. the 7th Annual Communication Networks and Services Research Conference, 2009:78-85.