因此网络安全审计系统开始受到广泛的重视。
Network security auditing system catches more and more attention of the system administrators.
研究与开发网络安全审计系统具有重要的现实意义。
Thus it is meaningful to study and develop the network security audit system.
本论文主要研究有效的安全审计系统的设计与实现。
This thesis focuses on the design and implementation of effective audit.
将此方法应用于实际的安全审计系统,得到了较好的效果。
Simulation results show that this method is valid in real security auditing systems.
为了解决内网安全问题,安全审计系统作为解决方案被提出来。
In order to solve internal security problems, security audit system is proposed as a solution.
网络集中安全审计系统的研究与应用已经成为国内外研究的热点。
The research and application of network concentration security audit system is becoming the focus of world.
安全审计愈来愈受关注,但是大多数分布式安全审计系统仍不成熟。
Security audit catch more and more attentions. But most distributed security audit systems are immature.
本文的安全审计系统主要由数据采集、数据分析、日志记录三部分组成。
This security audit system mainly consists of three parts: data collection, data analysis and logging.
安全审计系统对内部人员的违规操作起到了威慑作用,保证了内网安全。
Security audit system deters the staff from doing illegal operations and guarantees the internal security.
文中介绍了信息融合的概念和功能模型,以及安全审计系统的组成和功能。
This article introduces the concept and function model of information fusion. And it also introduces the components and functions of security auditing system.
为了解决这些问题,本文提出了基于数据挖掘的网络安全审计系统的方案并加以实现。
In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.
从实验结果中看出,该模型能有效提高安全审计系统的识别精度,消除分片语义歧义性。
The experiments show that the fragment audit model could improve the discernment precision of security audit systems efficiently and eliminate the fragment semantic ambiguity.
本文通过研究安全审计的相关技术和标准,设计并实现了一个针对各类应用系统的安全审计系统。
This paper studies related technologies and standards of security auditing, designs and implements a security audit system for various types of applications.
用宽带接入服务器(BAS)作为分布式审计代理实现城域网(MAN)上的主动式安全审计系统。
A broadband access server (BAS) was used as auditing agent to implement a distributed security auditing system on metropolitan area network (DSASMAN).
对目前一些分布式安全审计系统所存在的虚报率高、单点失效、网络通信负载过重等问题进行了改进。
We focus on addressing the problems that exist in some current distributed Security Audit System, for instance, high false alerting rate and too big network communication load, etc.
本文将信息过滤技术应用到安全审计的内容审计中,对于完善安全审计系统具有很高的理论指导作用。
In this paper, the information filtering technology is applied in content auditing, which will play a very important role on consummating theoretical direction of the safety audit system.
第六部分说明了网络内容安全审计的意义,并详细介绍了已实现的内容安全审计系统的总体框架和功能。
In chapter VI, the significance of Internet content security auditing was described and the overall framework and functions of the ICSA (Internet content security auditing) system were introduced.
该文在分析基于主机和基于网络的入侵检测系统的特点的基础上,提出了一种电子商务安全审计系统的设计。
This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.
其次根据目前网络安全审计中存在的问题提出了基于数据挖掘的网络安全审计系统的实现方案并建立了系统模型图。
Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
设计和实现了一个基于B/S&C/S混合模式的网络日志监控与安全审计系统原型,并对原型系统在实际应用环境中采集到的日志数据进行安全审计与分析。
The prototype of LSSAS in network based on B / S& C/ S mixing mode is designed and implemented, and the log data collected by prototype system in the applied environment are analyzed and audited.
新的安全特性增加了更深层次的管理、用户治理和审计,从而减少系统漏洞并大大提高开发人员的效率。
New security capabilities add deeper levels of management, user governance, and auditing to decrease system vulnerabilities, while maximizing developer productivity.
您也可以在得使您相信有人试图威胁系统安全的信息后,执行审计。
You can also perform an audit after receiving information that would lead you to believe someone is trying to compromise the security of your system.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
正常的系统审计也可以帮助提炼安装新机器时所使用的安全策略,因为它有助于关闭关于实际使用的子系统的反馈循环。
Regular system auditing will also help refine the security policy used for new machine installations as it helps close the feedback loop on what subsystems are actually in use.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
例程系统审计过程中需要验证的安全性需求应该与系统安装过程中使用的需求和安全性准则相同。
The security requirements that you verify during routine system auditing should be the same requirements and security principles that guide the system installation.
这从安全性的角度来看没有价值,而且实际上会略微增加风险,但是有可能使用操作系统级审计。
This has no value from a security perspective and in fact slightly increases risks, but does make it possible to use operating system level accounting.
政策相关的需求,例如用户访问及外部系统访问的安全性需求,ID管理政策,审计和登录。
Policy-related requirements, such as security requirements on the users' and external system's access, ID management policies, audit and logging.
审计网络访问控制和安全远程访问系统。
Audit network access control and secure remote access systems.
应用推荐