• This paper introduces a method, data fusion, to intrusion detection system (IDS), and presents a new design of DIDS based on data fusion.

    本文分布式入侵检测系统进行了介绍提出了一种基于数据挖掘以及分布式系统架构入侵检测系统。

    youdao

  • Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.

    还有一个办法调整IDS(入侵检测系统)IPS(入侵防御系统)查找有僵尸嫌疑的行为。

    youdao

  • Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.

    可以证明,Snort市面上最好易用或许也是最便宜的入侵检测系统。

    youdao

  • This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.

    冷战时期侵入侦测系统旨在周围环境融为一体,它能够探测300之外的任何活动物体

    youdao

  • Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.

    入侵检测系统保护网络系统安全关键技术重要手段,是网络安全领域研究热点

    youdao

  • The model of Multiple Neural Networks by Fuzzy(MNNF) integral presented in this paper is an effective method to improve the detection performance of network intrusion detection system.

    为了进一步提高网络入侵检测系统检测性能,将模糊积分理论和神经网络技术应用网络入侵检测提出了基于模糊积分的神经网络融合模型MNNF

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

  • When applying the algorithm to network behavior intelligent learning of intrusion detection system, the error rate is about 10%.

    算法应用于入侵检测系统网络行为智能学习仅为10%左右。

    youdao

  • This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.

    本篇论文针对当前网络入侵检测系统(IDS)检测规则提出了一个具有弹性的、实时的,动态调整入侵规则的方案。

    youdao

  • The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测主要目标用于检测非授权误用以及系统内部外部的入侵行为。

    youdao

  • To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.

    针对这些问题本文提出了基于粗糙集理论的入侵检测系统方法。

    youdao

  • Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.

    由于当前基于主机入侵检测系统局限性使得基于代理入侵检测技术显得日益重要

    youdao

  • Not attacking for more overall protection network, intrusion detection system will give play to irreplaceable function.

    全面保护网络受攻击入侵检测系统应运而生

    youdao

  • The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    youdao

  • Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.

    代理体系引入,将基于主机入侵检测基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统

    youdao

  • Intrusion detection is an important method to protect system security.

    入侵检测保护系统安全重要途径

    youdao

  • To the limitation of current intrusion detection models, an idea of formulating an intrusion detection model system (TAIDS) based on the GMTH Two-level algorithm was presented.

    针对现有入侵检测系统检测时间范围具有一定局限性的缺陷,提出了一种基于两水平算法的入侵检测系统模型(TAIDS)。

    youdao

  • This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .

    ANIDS是基于异常检测技术的入侵检测系统两个方面实现异常检测。

    youdao

  • This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.

    该文应用SVM分类特性识别网络攻击行为,提出了基于SVM入侵检测方法

    youdao

  • This paper presents a model of database intrusion detection system, which USES data mining on the audit data in database systems to derive user profiles that describe normal behavior of users.

    提出一种数据库入侵检测模型利用模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为用户轮廓

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    youdao

  • False positives and false negatives is one of the questions on Influencing the intrusion detection system quality, must use the effective method and the way to solve this problem.

    漏报影响入侵检测质量问题之一必须采用有效方法途径解决入侵事件的误报、漏报。

    youdao

  • The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测。

    youdao

  • An intrusion detection mechanism adapted to the current circumstances, which can enhance the intrusion detection speed and lower the system resources usage.

    提出了一种运用得到规则进行检测机制可以提高系统检测的速度降低系统资源使用率

    youdao

  • These methods can enhance the accuracy and efficiency of detection, and make intrusion detection system adapt to high-speed network.

    这些方法提高检测准确率效率使得入侵检测系统能够适应高速网络环境。

    youdao

  • In order to overcome the limitations lied at the classic self-non-self thinking, this paper proposes a novel Intrusion Detection System(IDS) based on double-signal inspired by danger theory.

    为了克服传统“自我—非”模型的不足,设计一种新的基于危险理论的双信号协同入侵检测模型。

    youdao

  • An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge.

    为了克服入侵检测系统存在着在先验知识较少情况推广能力的问题,提出了基于粗糙理论的入侵检测方法

    youdao

  • We also design and realize the modular which can converse the alert to uniform standard IDMEF form that make it integrate into distributed intrusion detection system conveniently.

    重新设计实现报警模块警报格式转换标准idmef格式使可以方便的集成分布式入侵检测系统中。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定