[1] Emilie Lundin, and Erland Jonsson, ”Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems,” Proceedings of the Computer Networks, Vol 34, No.5, pp.624-640, Aug.2000.
[2] T. Tothand C. Kruegel, “Connection-History Based Anomaly Detection,” Proc. IEEE Workshop Information Assurance and Security, June 2002.
[3] Richard A. Kemmerer,and Giovanni Vigna,“Intrusion Detection: A Brief History and Overview,”IEEE Computer,Volume: 35, Issue: 4, April 2002, pp. 27-30.
[4] C. Kruegel and G. Vigna, ”Anomaly Detection of Web-Based Attacks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS),pp.251-261,Oct.2003.
[5] G. Helmer, J. Wong, S. Madaka, “Anomalous intrusion detection system for hostile Java applets”, Journal of Systems and Software Volume: 55, Issue: 3, January 15, 2001, pp. 273-286
[6] N. Tuck and T. Sherwood and B. Calder and G. Varghese, "Deterministic memory efficient string matching algorithms for intrusion detection", In Proceedings of the IEEE Infocom Conference [1], pages 333--340.
[7] Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke, ”Intrusion and Misuse Detection in Large-Scale Systems,” IEEE Transactions on systems, Vol 27, No.3, pp.38-48, Feb.2002.
[8] Book: Jay Beale, ”Snort 2.1 Intrusion Detection second edition” Syngress Book Company.
[9] B. C. Soh, T.S. Dillon, ”Setting Optimal Intrusion-Detection Thresholds” , Computers and Security, Vol.14, 1995, pp. 621-631
[10] M. Roesch,“Snort—Lightweight Intrusion Detection for Networks,” Proc. Usenix Lisa ,99 Conf., Usenix Assoc., Berkeley, Calif., 1999.
[11] S .P. Shieh, V.C. Gligor ,”On a Pattern-Oriented Model for InstrusionDetection”,IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,VOL.9,NO.4JULY/AUGUST 1997,pp.661-667
[12] B. Caswell and J. Hewlett. Snort User Manual 2.6.0 Sourcefire, March 2006.
[13] M. Shoaib Alam, Qasim Javed, Dr M. Akbar, M.Raza Ur Rehman, M Bilal Anwer,“Adaptive Load Balancing Architecture for SNORT,” IEEE INCC 204. International Conference on Networking and Communication, 11-13 June 2004,pp.48-52.
[14] Charitakis, I. Anagnostakis, K. Markatos, E. “An active traffic splitter architecture for intrusion detection” Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003. 11th IEEE/ACM International Symposium on, Vol., Iss., 12-15 Oct. 2003
Pages: 238- 241
[15] Konstantinos Xinidis, Ioannis Charitakis, Spiros Antonatos, Kostas G. Anagnostakis, and Evangelos P.Markatos,”An Active Splitter Architecture for Intrusion Detection and Prevention ”,IEEE Transactions on Dependable and Secure Computing,Vol.3 No.1,January-March 2006
[16] Z. Cao, Z. Wang, and E.W. Zegura, “Performance of Hashing- Based Schemes for Internet Load Balancing,” Proc. IEEE Infocom, pp. 323-341, 2000.
[17] Hesselbach, X. and Fabregat, Ramon and Baran, B. and Donoso, Yezid and Solano, Fernando and Huerta, M. “Hashing based traffic partitioning in a multicast-multipath MPLS network model”, IFIP/ACM LANC, 2005
[18] 曾仁志,“高效率分散式入侵偵測系統之靜態法則分配演算法” ,中原大學資訊工程所碩士論文, 2005年[19] 徐英哲,”高效率分散式入侵偵測系統之適應性法則分配演算法”, 中原大學資訊工程所碩士論文, 2005年[20] Web Site:http://tcpreplay.sourceforge.net/