重新设计并实现了计算机日志勘察取证系统日志分析平台。
Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.
分析现有系统的日志。
如果没有这种策略,系统产生的日志消息就有可能无益于问题的分析和解决。
Without one, the log messages produced by the system may not be useful for problem resolution.
该象限中的另一个新兵是Splunk(但它位于试用分组当中),这是一个日志文件分析器,对于系统管理员很有帮助。
Another new appearance in this quadrant, but in the Trial zone, is Splunk, a log file analyzer useful to system administrators.
通过对基础信息系统的运行性能及运行日志的分析,解决日常使用中发生的问题并制定基础信息系统的优化方案并实施。
Based on the analysis for running performance and logs of the infrastructure system, to solve the issue in daily use and to develop the optimization plan and to implement.
然而传统的数据库审计系统往往只是一个简单的日志系统,而并不具备对日志进行分析的能力。
But the traditional database audit system is always only a simple log system without the ability of analyzing the log records.
在WCDMA系统测试中,分析手机日志是故障定位的重要手段之一。
UE log analysis is one of the key methods of trouble location in WCDMA system test.
事件日志是现代IT系统中分析和处理故障的重要信息来源。
Event log is one of the most information sources about analysis of fault in modern IT system.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
系统主要包括四个模块:数据采集模块、日志分析模块、入侵检测模块和用户接口模块。
There are mainly four modules in the system: data collection module, syslog analysis module, intrusion detection module, and user interface module.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本操作规程所称其他操作是指疑义信息反馈、核查日志查询、统计分析、系统管理等操作。
The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.
在论述日志关联分析平台的体系结构与功能模块的基础上,提出一种新的网络攻击追踪系统模型。
The article provides the system architecture and the principal functions of the log correlation system, then presents a framework of network attacker-tracing system.
本文通过对SIMS邮件系统日志文件的分析,探讨了本系统下的邮件计费策略,给出了该系统下的邮件计费系统的模型,并加以实现。
This paper discusses the accounting policy of SIMS email system based on the analysis of its audit, and presents a model of email accounting system, and its implementation as well as.
本文的安全审计系统主要由数据采集、数据分析、日志记录三部分组成。
This security audit system mainly consists of three parts: data collection, data analysis and logging.
设计并实现了日志分析子系统中任务导入、日志解析、日志分析以及报表等功能模块。
The modules that designed and implemented by author include task import module, log file parser module, log file analysis module and report module.
文中详细介绍了该网络管理系统的体系结构,进一步讨论了改进后的PATRICIA算法在网络日志分析中的应用。
The article introduces the frame of NMS in detail. Furthermore, we discuss the application of improved PATRICIA Algorithm in network log analyse.
最后对系统开发中的定时器管理、日志管理、网络数据的获取与分发等实际问题进行了分析和讨论。
Finally, the development of the system's timer management, log management, network data access and dissemination and other practical issues were discussed and analyzed.
测试完毕后,系统会自动生成测试日志,根据用户需求生成出所有模块的测试报表供参考,用户也可打印出每个模块的详细测试结果报表加以对比和分析。
Having the special design which are the interface for other algorithm and input the key. After testing, the system can mimeograph the testing table and log for user refer and compare.
并且对用户日志数据通过离线或在线的方式进行分析,得到用户的培训效果,以此分析评价系统性能。
In the system, we get the hidden information by on-line or off-line analyzing the data in user log. According to the result of data mining, the performance of system is Evaluated.
该平台可以统一管理运行在不同操作系统上的安全产品,并能对各种安全产品的日志数据进行统一分析。
This platform can manage all kinds of network security products running on different operating systems. Moreover, all kinds of log data can be analyzed identically by this platform.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
应用推荐