http://security.ctocio.com.cn/76/12715576.shtml
http://yepeng.blog.51cto.com/3101105/1155802/
http://www.lancope.com/eval-application/
http://www.darkreading.com/analytics/security-monitoring/more-improvements-to-siem-than-big-data/d/d-id/1139212?
http://security.zdnet.com.cn/security_zone/2012/0412/2088066.shtml
http://www.ibm.com/developerworks/opensource/library/os-bigdata/index.html
http://www.logrhythm.com/siem-2.0/logrhythm-security-intelligence/siem-with-logrhythm.aspx#LiveAccordionContent3366332-la
http://wuenlong.blog.51cto.com/4412161/d-1/p-2
当网络安全遇上大数据分析
http://www.zz2u.com/?p=223
http://www.shcert.org/news/49451f4f4cb448c3a055e00028c1f3fb.html
http://bbs.cisps.org/viewtopic.php?t=30175
http://wuenlong.blog.51cto.com/4412161/781579
http://domynews.blog.ithome.com.tw/category/1252/10007
http://sec.chinabyte.com/163/12672163_3.shtml