• 提出了一个两层马尔可夫异常入侵检测模型

    A new two-layer Markov chains anomaly detection model that operated on system call traces was presented.

    youdao

  • 提出一种基于免疫多峰值进化异常入侵检测方法

    The paper presents an artificial immunity based multimodal evolution approach for anomaly intrusion detection.

    youdao

  • 模型进行滥用入侵检测进行异常入侵检测

    This model not only can check abuse detection but also anomaly detection.

    youdao

  • 算法实现简单有效并且理论上,能很好地应用于异常入侵检测

    The algorithm is simple and effective in theory and applied wonderfully to anomaly detection.

    youdao

  • 支持向量机应用于网络入侵检测提出一种基于支持向量机的网络异常入侵检测模型

    Apply SVM technique to network intrusion detection, and propose a network abnormal intrusion detection model based on SVM.

    youdao

  • 论文提出了基于潜在语义索引LSI)和支持向量SVM异常入侵检测方法

    This paper proposes a new Support Vector Machine(SVM) for anomaly intrusion detection method based on Latent Semantic Indexing(LSI).

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

  • 检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用的各种不同检测技术。

    This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    youdao

  • 网络异常入侵检测中,应用基于QPSOWLS - SVM算法效果显著特别是对于样本数据量具良好预测能力

    In the web anomaly intrusion detection, the application of the WLS-SVM based on QPSO algorithm, the results is significantly, especially to small sample size of data has good predictive ability.

    youdao

  • 入侵检测分析技术主要分为滥用入侵检测异常入侵检测目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    youdao

  • 目前入侵检测技术研究重点集中在无需指导异常检测上。

    At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.

    youdao

  • 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 给出了针对无线网络入侵检测模型网络异常行为检测策略

    Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.

    youdao

  • 而基于OCSVM入侵检测需要任何标记数据,并且能够从未标记的数据集中发现异常

    However, OCSVM-based intrusion detection approaches do not need any labeled data set, and attempt to find anomaly buried in the data.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 当前入侵检测技术主要有基于规则的误用检测基于统计异常检测

    The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.

    youdao

  • 重点论述两种典型入侵检测方法异常行为检测方法比较学习检测方法的基本原理,并此基础上实现了一个实际的入侵检测专家系统。

    And then the two typical methods of the intrusion detection on its importance are discussed-the basic concept of anomaly detection method and compared study detection method.

    youdao

  • 入侵检测技术原理分为异常检测误用检测检测内容分为主机入侵检测网络入侵检测技术。

    On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    youdao

  • 网络入侵检测算法方面本文异常误用检测算法进行了研究

    On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    youdao

  • 实验表明,半监督自适用算法较好解决入侵检测即时异常进程问题

    Experimental results show that Semi-supervised self-adaptative algorithm can better solve the real-time exception detection process issues.

    youdao

  • 如果一个实际入侵行为稍有偏差就可能正常模式匹配,而异常检测系统无法检测到这种入侵行为。

    In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.

    youdao

  • 基于程序行为异常检测方法主要通过建立程序正常行为模式检测入侵

    It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.

    youdao

  • ANIDS是基于异常检测技术的入侵检测系统两个方面实现异常检测

    This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .

    youdao

  • 入侵检测通过分析审计事件,发现系统异常活动电子警务安全保护的一重要途径

    Intrusive-detection is an important approach to protecting electronic policing by means of analyzing the audit affairs and detecting the abnormal events in the system.

    youdao

  • 针对异常发现技术模式匹配技术各有利弊特点,设计了种技术综合运用网络入侵检测系统

    On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.

    youdao

  • 然后分析入侵检测技术比较异常检测滥用检测各自优缺点,以及各种检测方法数据来源

    Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.

    youdao

  • 介绍入侵检测中的滥用检测异常检测

    Then misuse intrusion detection and anomaly intrusion detection of IDS's are represented .

    youdao

  • 入侵检测按照检测技术分为:基于异常入侵检测基于误用入侵检测

    The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    youdao

  • 入侵检测按照检测技术分为:基于异常入侵检测基于误用入侵检测

    The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定