• 重点论述两种典型入侵检测方法异常行为检测方法比较学习检测方法的基本原理,并此基础上实现了一个实际的入侵检测专家系统

    And then the two typical methods of the intrusion detection on its importance are discussed-the basic concept of anomaly detection method and compared study detection method.

    youdao

  • 本文提出种基于CVE标准建立的入侵检测专家系统规则,该入侵检测专家系统是基于网络主机的混合结合体,提供集成化的检测报告响应功能。

    We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

    youdao

  • 第二二当前绝大多数入侵检测产品采用专家系统网络攻击手段变化多样,导致误报漏报率太高

    Second, the expert system adopted currently by most intrusion detection products have high false alarm rate because the network attack means change variably.

    youdao

  • 然后概括介绍系统入侵检测技术其中包括神经网络专家系统人工智能技术计算机系统入侵检测中的应用。

    Then, several intrusion detection techniques are presented, in which artificial intelligent techniques such as neural networks and expert systems are included.

    youdao

  • 对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原入侵检测等技术

    Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    youdao

  • 利用传统基于模糊推理规则匹配的专家系统其进行入侵检测已不能满足系统实时性准确度要求

    Simply use the traditional technique based on fuzzy reasoning or expert system in intrusion detection system can not satisfy real-time and accuracy requirements.

    youdao

  • 利用传统基于模糊推理规则匹配的专家系统其进行入侵检测已不能满足系统实时性准确度要求

    Simply use the traditional technique based on fuzzy reasoning or expert system in intrusion detection system can not satisfy real-time and accuracy requirements.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定