[1]McHugh J. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory[J].ACM Trans on Information and System Security, 2000,3(4):262294.
[2]Lippmann R,Fried D,Graf I. Evaluating Intrusion Detection Systems: The 1998 DARPA Off Line Intrusion Detection Evaluation[C]∥Proc of the 2000 DARPA Information Survivability Conf and Exposition, 2000:323325.
[3]Phoenix. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods[C]∥Proc of Performance, Computing, and Communications Conf,2002:329334.
[4]Gaffney J E, Ulvila J W. Evaluation of Intrusion Detectors:A Decision Theory Approach[C]∥Proc of the 2001 IEEE Symp on Security and Privacy, 2001:5061.
[5]Ulvila J W, Gaffney J E. Evaluation of Intrusion Detection Systems[J]. Journal of Research of the National Institute of Standards and Technology,2003,108(6):453 473.
[6]Gu Guofei, Fogla P, Dagon D. An InformationTheoretic Measure of Intrusion Detection Capability[R].Technical Report GITCC0510 College of Computing, 2005.
[7]Gu Guofei, Fogla P, Dagon D. Towards an InformationTheoretic Famework for Analyzing Intrusion Detection Systems[C]∥Proc of the 11th European Symp on Research in Computer Security, 2006:527546.
[8]田俊峰,刘涛,陈小祥. 入侵检测系统的评估方法与研究[J].计算机工程与应用,2008,44(9):113117.
[9]Gu Guofei, Fogla P. David Dagon Measuring Intrusion Detection Capability: An InformationTheoretic Approach[C]∥Proc of ASIACCS’06, 2006:90101. |