参考资源

我写作本章时参考了以下网站,读者要想进一步学习,欢迎到这些网站进一步了解更多信息:

·https://www.ibm.com/developerworks/cn/analytics/library/ba-1507-decisiontree-algorithm/index.html

·http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

·http://www.freebuf.com/articles/system/97703.html

还有一些参考文献值得一读:

[1] G Creech,J Hu.A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns.Computers,IEEE Transactions on,2013.

[2] G Creech,J Hu.Generation of a New IDS Test Dataset:Time to Retire the KDD Collection.Wireless Communications&Networking Conference,2013:4487-4492.

[3] M Xie,J Hu,J Slay,Evaluating Host-Based Anomaly Detection Systems:Application of the One-Class SVM Algorithm to ADFA-LD.International Conference on Fuzzy Systems&Knowledge Discovery,2014,2000:978-982.