提出了一个两层马尔可夫链异常入侵检测模型。
A new two-layer Markov chains anomaly detection model that operated on system call traces was presented.
提出一种基于免疫的多峰值进化异常入侵检测方法。
The paper presents an artificial immunity based multimodal evolution approach for anomaly intrusion detection.
该模型既能进行滥用入侵检测,又能进行异常入侵检测。
This model not only can check abuse detection but also anomaly detection.
此算法实现简单﹑有效,并且从理论上,能很好地应用于异常入侵检测。
The algorithm is simple and effective in theory and applied wonderfully to anomaly detection.
将支持向量机应用于网络入侵检测,提出一种基于支持向量机的网络异常入侵检测模型。
Apply SVM technique to network intrusion detection, and propose a network abnormal intrusion detection model based on SVM.
论文提出了一种基于潜在语义索引(LSI)和支持向量机(SVM)的异常入侵检测方法。
This paper proposes a new Support Vector Machine(SVM) for anomaly intrusion detection method based on Latent Semantic Indexing(LSI).
监视程序行为是近年基于主机的异常入侵检测的研究热点,构建程序行为模型是进行异常检测的关键。
Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.
对检测入侵方法中的两种方法——异常入侵检测和误用入侵检测进行了描述,介绍了这两种方法中采用的各种不同的检测技术。
This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.
在网络异常入侵检测中,应用基于QPSO的WLS - SVM算法效果显著,特别是对于小样本数据量具有良好的预测能力。
In the web anomaly intrusion detection, the application of the WLS-SVM based on QPSO algorithm, the results is significantly, especially to small sample size of data has good predictive ability.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
给出了针对无线网络的入侵检测模型和网络异常行为检测策略。
Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
而基于OCSVM的入侵检测不需要任何标记数据,并且能够从未标记的数据集中发现异常。
However, OCSVM-based intrusion detection approaches do not need any labeled data set, and attempt to find anomaly buried in the data.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
当前的入侵检测技术主要有基于规则的误用检测和基于统计的异常检测。
The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.
重点论述了两种典型的入侵检测方法—异常行为检测方法和比较学习检测方法的基本原理,并在此基础上实现了一个实际的入侵检测专家系统。
And then the two typical methods of the intrusion detection on its importance are discussed-the basic concept of anomaly detection method and compared study detection method.
入侵检测技术从原理上分为异常检测和误用检测,从检测内容上分为主机入侵检测和网络入侵检测技术。
On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
实验表明,半监督自适用算法能较好地解决入侵检测的即时异常进程问题。
Experimental results show that Semi-supervised self-adaptative algorithm can better solve the real-time exception detection process issues.
如果一个实际的入侵行为稍有偏差就有可能与正常的模式相匹配,而异常检测系统则无法检测到这种入侵行为。
In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.
基于程序行为的异常检测方法主要通过建立程序正常行为模式库来检测入侵。
It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.
ANIDS是基于异常检测技术的入侵检测系统,它从两个方面来实现异常检测。
This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .
入侵检测通过分析审计事件,发现系统中异常活动,是电子警务安全保护的一条重要途径。
Intrusive-detection is an important approach to protecting electronic policing by means of analyzing the audit affairs and detecting the abnormal events in the system.
针对异常发现技术和模式匹配技术各有利弊的特点,设计了将这两种技术综合运用的网络入侵检测系统。
On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.
然后分析入侵检测技术。比较异常检测和滥用检测各自的优缺点,以及各种检测方法的数据来源。
Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.
介绍了入侵检测中的滥用检测和异常检测。
Then misuse intrusion detection and anomaly intrusion detection of IDS's are represented .
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
应用推荐