[1] 唐勇, 卢锡城, 胡华平, 等. Honeypot技术及其应用研究综述[J]. 小型微型计算机系统, 2007, 28(8): 1345-1351. Tang Yong, Lu Xicheng, Hu Huaping, et al. Honeypot technique and its applications: a survey[J]. Journal of Chinese Computer Systems, 2007, 28(8): 1345-1351. [2] Wu Bin, Zheng Kangfeng, Yang Yixian. A data safety transmission solution in web application//WI-IAT Workshop. Silicon Valley: IEEE Computer Society, 2007: 303-306. [3] Jin Hai, Sun Jianhua, Chen Hao, et al. A fuzzy data mining based intrusion detection model//the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems. Suzhou: IEEE Computer Society, 2004: 191-197. [4] Han Jiawei , Cai Yandong, Cercone N. Data-driven discovery of quantitative rules in relational databases[J]. IEEE Transactions on Knowledge and Data Engineering, 1993, 5(1): 29-40. [5] Julisch K. Clustering intrusion detection alarms to support root cause analysis[J]. ACM Transactions on Information and System Security, 2003, 6(4): 443-471. [6] Agrawal R, Srikant R. Fast algorithms for mining association rules//the 20th International Conference on Very Large Databases. Santiago: , 1994: 487-499. [7] Han Jiawei, Micheline K. Data mining: concepts and techniques[M]. Fan Ming, Meng Xiaofeng, translated. Beijing: China Machine Press, 2007: 149-158. |