• 但是实际中的应用仍然局限于异常检测误用检测

    But, it is limited to use anomaly detection and misuse detection in practice.

    youdao

  • 网络入侵检测算法方面本文异常误用检测算法进行了研究

    On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    youdao

  • 数据分析融合了异常检测误用检测两种方法提出相应检测模型引入了函数

    The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.

    youdao

  • 入侵检测技术原理分为异常检测误用检测检测内容分为主机入侵检测网络入侵检测技术。

    On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    youdao

  • 入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    youdao

  • 通过构建状态其中提取出相关信息,不仅可以同时兼顾基于误用基于异常的两种检测方法而且使得它们获得更好检测效果

    By constructing state machine and get information from it, this approach can contain both anomaly-based and misuse-based intrusion detection methods, and gain the better detection capability.

    youdao

  • 其中规则包含正常行为规则异常行为规则,使得原型系统理论上既实现误用检测也可实现异常检测采用关联规则挖掘模块网络连接数据进行处理。

    The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.

    youdao

  • 摘要入侵特征值识别发现算法误用入侵检测中的关键技术

    Absrtact: Invasion eigenvalue and discovery algorithm are the key technologies to misuse intrusion detection technology.

    youdao

  • 入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测

    The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    youdao

  • 当前入侵检测技术主要有基于规则的误用检测基于统计异常检测

    The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.

    youdao

  • 检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用的各种不同检测技术。

    This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    youdao

  • 系统在设计检测部分时,采用两种检测模式误用模式异常模式。

    The two popular detection modes, Misuse mode and Anomaly mode, have been taken into the design of detection part of the Agent.

    youdao

  • 根据入侵检测原理不同,入侵检测分为误用检测异常检测两种。

    According to the differences of intrusion detection theory, it includes misuse-based detection and anomaly-based intrusion.

    youdao

  • 通过网络数据包分析挖掘出网络系统中频繁发生行为模式,运用模式相似比较对系统的行为进行检测进而自动建立异常误用行为的模式库。

    By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    youdao

  • 通过网络数据包分析挖掘出网络系统中频繁发生行为模式,运用模式相似比较对系统的行为进行检测进而自动建立异常误用行为的模式库。

    By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定