• 网络入侵行为响应策略完善

    It isn't perfects in the response policy of the network attacks.

    youdao

  • 入侵检测系统用来检测网络入侵行为工具

    IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    youdao

  • 随着互联网络的飞速发展,网络入侵行为日益严重

    With the internet fast developping, net inbreak action have been serious increasingly.

    youdao

  • 通过检测这种光的变化可以探测外界入侵行为

    By detecting the changes, the outside intrusion can be detected.

    youdao

  • 系统架构主动发现阻止入侵抑制入侵行为

    This framework can actively discover and prevent intruders and restrain intrusion action.

    youdao

  • 用户非正常活动进行统计分析发现入侵行为规律

    Normal activities of the user's non-statistical analysis and found that intrusion of the law.

    youdao

  • 现有入侵检测方法难以有效地检测这种分布式入侵行为

    It is difficult to detect effectively these distributed attacks by the current intrusion detection approaches.

    youdao

  • 方法有效检测外部用户内部用户对系统入侵行为

    The method can effectively detect the act of intruding system from the inside user and outer user.

    youdao

  • 通过与其它安全产品联动可以实现对入侵行为的有效阻止

    It also can stop intrusion activities with the linkage of other security technology.

    youdao

  • 另外可以用来提取一些未知未被发现入侵行为模式等

    It can also be used to pick up some unknown or undetected intrusion modes.

    youdao

  • 入侵检测技术可以网络系统受到损害入侵行为做出拦截响应

    Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.

    youdao

  • 为了发现潜在入侵行为扩展了IDMEF格式提出了怀疑概念

    To find latent intrusion, the intrusion detection message exchange format(IDMEF) was extended with a concept of suspicion level proposed.

    youdao

  • 为了有效地对付网络入侵行为端口扫描进行研究非常有益必要的。

    It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively.

    youdao

  • 入侵检测一种通过某种方法完成网络系统入侵行为检测报告技术

    Intrusions detection is a technology through the completion of the network system intrusions detection and reporting.

    youdao

  • 入侵检测主要目标用于检测非授权误用以及系统内部外部入侵行为

    The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    youdao

  • 网络入侵一种可以检测分析入侵行为做出主动控制安全技术

    Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.

    youdao

  • 俄罗斯在对入侵行为进行辩解时候表现的非常敷衍宣称此举为了保护俄罗斯公民

    Russia has made perfunctory attempts to justify the invasion. It claimed that it was defending Russian citizens.

    youdao

  • 如果一个实际入侵检测系统不对数据进行处理,则无法准确地检测入侵行为

    If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.

    youdao

  • 随着互联网飞速发展网络入侵行为日益严重,网络安全日益成为人们关注焦点

    With the quick development of the Internet, network intrusion behavior becomes more and more serious; network security becomes the focus which people pay attention to.

    youdao

  • 操作系统类型信息对于研究针对计算机网络入侵行为和安全防护措施非常重要的。

    Information of OS types is very important to the research on intrusion behaviors against computer networks.

    youdao

  • 通常根据系统正常数据背景检测入侵行为故而也人称其为启发式特征检测”。

    It usually measures the behavior of invading according to the normal dataflow background of the system, so is called "the heuristic characteristic measures".

    youdao

  • 模型Q-学习行为意图跟踪入侵预测结合起来,可获得未知入侵行为检测响应

    Combined with Q - learning, action tracing and intrusion forecasting, this model is applied to detect and response to the unknown intrusion.

    youdao

  • 实验表明算法针对不同特征属性数据检测不同类型入侵行为,具有好的检测结果

    The experimental results indicate that the algorithm is very successful in picking different types of attacks in data set based on different attribute features.

    youdao

  • 基于数据挖掘入侵检测系统具有一定自学习性完善性,可以检测已知或未知入侵行为

    IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.

    youdao

  • 大部分入侵行为都会引起入侵主机存储变动因此检查存储变动一种有效入侵检测方法

    Most intrusion behaviors could cause storage modification of intruded hosts, so checking storage modification is an effective intrusion detection method.

    youdao

  • 测试结果表明IIDS可以有效地检测网络入侵行为以及未知攻击模式,达到预期目标

    The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.

    youdao

  • 数据包入侵规则进行模式匹配时,使用什么样的模式匹配算法快速准确地检测出入侵行为

    The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.

    youdao

  • 数据包入侵规则进行模式匹配时,使用什么样的模式匹配算法快速准确地检测出入侵行为

    The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定