• The data model of RIDS information source, the algorithm of intrusion analysis and the composition of sensor, inspector and data warehouse are introduced.

    给出RIDS信息源数据模型入侵分析算法传感器检测器、数据仓库构成

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

  • The contract covers a wide range of network management services, including network defense, intrusion detection and analysis, remedies and spectrum network management.

    合同覆盖多种网络管理服务包括网络防御入侵探测分析救援频谱网络管理。

    youdao

  • Other application areas include intrusion detection, web log analysis, database access patterns, and so on.

    其他应用领域还包括侵入检测Web日志分析数据库访问模式等等

    youdao

  • Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.

    文章通过计算机网络入侵方法手段分析提出一些防范措施侦查取证方法。

    youdao

  • Most of the intrusion detection is beginning at the analysis of user command sequence.

    大多数入侵检测都会以用户命令序列分析作为开始

    youdao

  • There are mainly four modules in the system: data collection module, syslog analysis module, intrusion detection module, and user interface module.

    系统主要包括四个模块数据采集模块日志分析模块、入侵检测模块用户接口模块。

    youdao

  • The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.

    运行节点计算机入侵检测系统具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作

    youdao

  • It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.

    在遭受入侵实时地收集可靠证据完成入侵事件检测取证分析弥补了入侵检测的不足,有效地阻止了黑客攻击

    youdao

  • This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.

    本文分析现有网络入侵模式匹配BM算法基础,提出改进BM规则匹配算法

    youdao

  • By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.

    通过分析各种入侵检测技术我们入侵检测引擎的实现过程中采用了协议分析命令解析以及分析统计方法

    youdao

  • Through error analysis to prove grey related between analysis and BP network is combined to predict magmatic intrusion range is feasible.

    通过误差分析证明将灰色关联分析BP网络结合起来进行岩浆侵入范围预测可行的。

    youdao

  • According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.

    根据这种思想论文入侵检测基于系统调用入侵检测技术进行了深入分析和讨论。

    youdao

  • This paper introduces an intrusion detection model based on clustering analysis and realizes an algorithm of K-means which can set up a database of intrusion detection and classify safe levels.

    提出基于聚类分析方法构建入侵检测模型实现了k -平均值方法建立入侵检测库据此划分安全等级的思想。

    youdao

  • This article through the analysis existing intrusion detection technology good and bad points, proposed one kind of improvement cluster algorithm CLOPE to apply to the network intrusion detection.

    本文通过分析现有入侵检测技术的优缺点,提出改进聚类算法CLOPE将其应用网络入侵检测。

    youdao

  • Normal activities of the user's non-statistical analysis and found that intrusion of the law.

    用户非正常活动进行统计分析发现入侵行为规律

    youdao

  • And this article makes a detailed analysis of the definition of residence and the understanding of the act of unlawful intrusion.

    本文并就住宅界定非法侵入行为理解详细分析

    youdao

  • The specific quantitative analysis about some of the major indices was made, moreover, the process of intrusion and detection was simulated with probability tree.

    量化分析一些主要测试指标利用概率模拟入侵检测过程

    youdao

  • Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.

    分析现有分布式入侵检测系统拓扑结构基础设计实现自组织的层次式大规模网络入侵检测系统。

    youdao

  • Through the analysis, it is shown that the Matsa s extratropical transition and the re-intensification are due to the intrusion of cold air from the upper-level trough into the typhoons circulation.

    一个在陆上长久维持并最终演变成温带气旋登陆台风“麦莎”为研究对象,通过其北上变性过程的分析发现,台风与中高纬西风相互作用使得冷空气侵入变性加强的原因

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.

    UML协同入侵检测系统分析设计提供有效手段方便其它安全系统的集成

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

  • So a new kind of intrusion detection technology based on immunological theory is introduced to improve the detection and analysis abilities of the system .

    本文主要研究基于免疫入侵检测技术以期完善系统对入侵检测分析能力

    youdao

  • The numerical simulation and theoretical analysis for sea water intrusion in coastal region are very important in the theory and practice of the environmental science.

    滨海含水层中的海水入侵数值模拟理论分析环境科学十分重要理论实际问题

    youdao

  • The dissertation mainly aims at applying support vector machine (SVM) and kernel principal component analysis (KPCA) to intrusion detection.

    本文主要工作是支持向量(SVM)成分分析(KPCA)应用入侵检测技术中。

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定