参考资源

我写作本章时参考了以下网站,读者要想进一步学习,欢迎到这些网站进一步了解更多信息:

·http://blog.csdn.net/lizhengnanhua/article/details/9061755

·https://wenku.baidu.com/view/01536f13a21614791711286b.html

还有一些参考文献值得一读:

[1] G Creech.Developing a High-Accuracy Cross Platform Host-Based Intrusion Detection System Capable of Reliably Detecting Zero-Day Attacks.University of New South Wales,2014.

[2] S Forrest,S Hofmeyr,A Somayaji.The Evolution of System-Call Monitoring.Computer Security Applications Conference,2008:418-430.

[3] S Forrest,S Hofmeyr,A Somayaji,T A Longstaff.A Sense of Self for Unix Processes.Security and Privacy,1996.

[4] S Hofmeyr,S.Forrest,A Somayaji.Intrusion Detection Using Sequences of System Calls.Journal of Computer Security,1998.