[1] P Loscocco, S Smalley, P Muckelbauer, R Taylor, J Turner, J Farrell.The inevitability of failure:The flawed assumption of security in modern comput ing environments.In :Proceedings of the 21st N ational Inf ormation S ystems Secu rit y Conference.1998.303-314[2] National Computer Security Center.Department of defense trusted computer system evaluation criteria.DoD 5200.28-STD.1985[3] The International Organization for Standardization.Common criteria for information technology security evaluation———Part 1, 2, 3。1999[4] Paul Whelan.Linux security auditing.Available at http://ww.sans.org.2001[5] Deborah Downs, Jerzy Rub, Kenneth Kung, Carole Joran。Issues in discretionary access control。In:Proceedings of the 1985 IEEE Sympo-sium on S ecurity and Privacy.IEEE C omput er S ociety Press, 1985.208[6] Fort George G Meade.A guide to understanding audit in trusted systems.NCSC-TG-001.Version-2, Library No.S-228, 470.1987[7] Terry Escamilla.Intrusion detection:Network security beyond the firewall.Wiley Computer Publishing, 1998.ISBN 0-471-29000-9.30