• You know that Snort is an intrusion detection system, but how does it detect intrusion?

    知道Snort一种入侵检测系统如何检测入侵的呢?

    youdao

  • This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.

    冷战时期侵入侦测系统旨在周围环境融为一体,它能够探测300之外的任何活动物体

    youdao

  • Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.

    入侵检测技术可以网络系统受到损害对入侵行为做出拦截响应

    youdao

  • This method can detect intrusion action on system level, network level and user level, simulation experiment indicates the method has very highly detection ability and robust ability.

    方法能够检测系统网络用户级的入侵行为模拟实验表明方法很强检测能力较好的鲁棒性。

    youdao

  • Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.

    实验表明系统已知攻击模式具有很高检测对未知攻击模式具有一定检测能力。

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

  • The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    youdao

  • The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测主要目标用于检测非授权误用以及系统内部外部的入侵行为。

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • Intrusion Prevention System (IPS) not only can detect malicious behavior, but also can stop the malicious behavior.

    入侵防御系统不仅检测网络中的入侵和攻击行为并且能够及时地阻断入侵和攻击行为。

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • The NN system in the model need lucubrate, and the result display, the model is effective, it can detect the intrusion action in lowly mistake rate.

    模型使用的NN系统进一步深入研究,但实验结果表明,该模型有效的,能够以较低的错误率检测入侵行为

    youdao

  • Traditionally, intrusion detection systems detect intrusions at the operating system(OS)level.

    传统入侵检测系统方法是操作系统检测入侵。

    youdao

  • Experimental result proves that the model can detect intrusion from the network connection data at a lower system false alarm rate and a higher detection rate.

    实验结果表明,与其他模型相比,模型具有低的较高检测率。

    youdao

  • Experimental result proves that the model can detect intrusion from the network connection data at a lower system false alarm rate and a higher detection rate.

    实验结果表明,与其他模型相比,模型具有低的较高检测率。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定