• 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 基于数据挖掘入侵检测系统具有一定自学习性完善性,可以检测已知或未知入侵行为

    IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 提出了一种基于系统调用序列入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式

    In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.

    youdao

  • 研究系统多个系统关键程序运行监控问题提出了一个基于进程行为分类入侵检测系统原型

    The running and monitor problems of many system key programs in the system are researched and IDS prototype is put forward based on process behavior classifier.

    youdao

  • 基于进程行为入侵检测技术主机防范入侵检测恶意代码重要技术手段之一

    Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.

    youdao

  • 基于程序行为异常检测方法主要通过建立程序正常行为模式检测入侵

    It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.

    youdao

  • 该文应用SVM分类特性识别网络攻击行为提出了基于SVM入侵检测方法

    This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

  • 为了能有效地检测跟踪入侵行为这里提出了一个基于智能代理入侵检测系统的体系结构分布跟踪算法

    In order to detect and trace the intrusion, an architecture for intrusion detection based intelligent agent and a distributed trace algorithm are presented.

    youdao

  • 描述属性建立模糊轮廓行为属性建立行为模式基于模糊轮廓树实现入侵检测的方法。

    We build a fuzzy profile tree based on describing attributes and behavior patterns based on acting attribute, and finally detect invasions based on the fuzzy profile tree.

    youdao

  • 针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法的异常检测模型QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。

    To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    youdao

  • 针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法的异常检测模型QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。

    To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定