Reference: [1] Wang Jun, Wang ChongJun, Xie JunYuan, et al. Research on Agent-based Intrusion Detection Technique Based on Agent-based Network Intrusion Detection Technology[J]. Computer Science, 2006, 33(12): 65-69. [2] Wu Zhuang, Chen Jiaxin, Wang Keping, et al. Improved IPv4/v6 Network IDS Technology An Improved IPv4/v6 Network Intrusion Detection Technology[J]. Computer Science, 2011, 38(6): 140-141 . [3] Shi Zhicai, Xia Yongxiang, Shi Zhicai, et al. Survey on intrusion detection techniques for high-speed networks. Research on intrusion detection technology in high-speed network environment[J]. Journal of Computer Applications, 2010, 27(5): 1606 -1610. [4] Li Tian, Li Tian. Research on network intrusion detection technology based on improved K-means clustering algorithm [C] National Conference on Computer New Technology and Computer Education. 2009.. [5] Kan Yuan, Zhang Guoqing, et al. Application research of key technologies in network intrusion detection system [C]// National Conference on Computer New Technology and Computer Education. 2010. [6] Zhang Yong, Zhang Deyun, Li Shenglei, et al. Research and Implementation of Network Intrusion Detection Technology Based on Hierarchical Structure[J]. Small Computer Systems, 2001, 22(1): 41-44. [7] Wu Chengzhen, Yin Jianping, Cai Zhiping, et al. Research on Pattern Matching Technology Based on Multi-core Platform in Network Intrusion Detection System[J]. Computer Engineering and Science, 2009, 31(9):1-4. [8] Zhang Jihua, Jiang Tianfa. Research on Self-defense Technology of Network Intrusion Detection System Based on Information Security[J]. Journal of Wuhan University of Technology, Transportation Science and Engineering, 2007, 31(6): 1102-1105. [9] Zhuang Yi, Tian Ming, Gu Jingjing, et al. Research on Network Intrusion Detection System Based on Distributed Data Mining Technology[J]. Journal of Wuhan University: Sci Ed, 2004(A01): 87-90. [10] Meng Xiaoming. Technology and Methods of Invading Detection about Network Information Research on Intrusion Detection Technology and Method of Network Information[J]. Modern Library and Information Technology, 2004, 20(2): 63-65.
|