• 满足这些需求第一工具系统审计基于主机入侵检测

    The first tools for meeting these requirements are system auditing and host-based intrusion detection.

    youdao

  • 文件系统完整性校验一种基于主机入侵检测技术可以检测入侵主机文件非法修改

    File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.

    youdao

  • 基于网络基于主机入侵检测系统有机地结合在一起提供集成化的检测报告和响应功能。

    It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.

    youdao

  • 代理体系引入,将基于主机入侵检测基于网络入侵检测灵活地融为一体,形成一个统一入侵检测系统

    Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.

    youdao

  • 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 该文分析基于主机基于网络入侵检测系统特点的基础上,提出一种电子商务安全审计系统的设计。

    This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.

    youdao

  • 基于进程行为入侵检测技术主机防范入侵检测恶意代码重要技术手段之一

    Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.

    youdao

  • 由于当前基于主机入侵检测系统局限性使得基于代理入侵检测技术显得日益重要

    Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

  • 本文提出基于CVE标准建立的入侵检测专家系统规则,该入侵检测专家系统是基于网络主机混合结合体,提供集成化的检测报告响应功能。

    We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

    youdao

  • 本文讨论基于主机基于网络入侵检测技术不同之处说明如何两种方式融合一起,提供更加有效入侵检测和保护措施

    This paper discusses the difference of Intrusion Detection based on host and net. It explains how to integrate two ways in order to provide efficient Intrusion Detection and protect measures.

    youdao

  • 结合网络入侵主机入侵方面的检测能力,构建了基于智能体的分布式入侵检测系统体系结构模型。

    This paper designs an Agent-based Distributed Intrusion Detection System. The DIDS system combines host-based intrusion detection and network-based intrusion detection functions.

    youdao

  • 两种基本类型入侵检测基于主机的基于网络的。

    There are two basic types of intrusion detection: host-based and network-based.

    youdao

  • 结合基于主机入侵检测系统基于网络入侵检测系统各自特点形成节点入侵检测系统。

    To form node intrusion detection system by combining the character of host intrusion detection system and net intrusion detection system.

    youdao

  • 基于代理的分布式入侵检测系统实现了基于主机基于网络检测结合网络系统提供更好安全保护

    It provides a better safeguard for network system by the multi-agent-based distributed intrusion detection system that combines host-based IDS with network-based IDS.

    youdao

  • 基于代理的分布式入侵检测系统实现了基于主机基于网络检测结合网络系统提供更好安全保护

    It provides a better safeguard for network system by the multi-agent-based distributed intrusion detection system that combines host-based IDS with network-based IDS.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定