参考资源

我写作本章时参考了以下网站,读者要想进一步学习,欢迎到该网站进一步了解更多信息:http://www.mamicode.com/info-detail-501714.html

还有一些参考文献值得一读:

[1] G Creech,J Hu.A Semantic Approach to Host-based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns.Computers,IEEE Transactions,2013.

[2] M Xie,J Hu,J Slay.Evaluating Host-Based Anomaly Detection Systems:Application of the One-Class SVM Algorithm to ADFA-LD[M].Springer International Publishing,2014.

[3] A K Ghosh,A Schwartzbard,M Schatz.Learning Program Behavior Profiles for Intrusion Detection.Workshop on Intrusion Detection and Network Monitoring,vol.51462,1999.

[4] G Creech,J Hu.A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns.Computers,IEEE Transactions,2013.

[5] Y Liao,V R Vemuri.Use of K-Nearest Neighbor Classifier for Intrusion Detection.Computers&Security,2002.

[6] M Xie,J Hu.Evaluating Host-Based Anomaly Detection Systems:A Preliminary Analysis of Adfa-ld.International Congress on Image&Signal Processing,2013,03:1711-1716.