• 目前入侵检测技术研究重点集中在无需指导异常检测上。

    At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.

    youdao

  • 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 然后分析入侵检测技术比较异常检测滥用检测各自优缺点,以及各种检测方法数据来源

    Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.

    youdao

  • 入侵检测按照检测技术分为:基于异常入侵检测基于误用入侵检测

    The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    youdao

  • 检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用的各种不同检测技术

    This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    youdao

  • 入侵检测技术原理分为异常检测误用检测检测内容分为主机入侵检测网络入侵检测技术

    On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    youdao

  • 当前入侵检测技术主要有基于规则的误用检测基于统计异常检测

    The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.

    youdao

  • 入侵检测分析技术主要分为滥用入侵检测异常入侵检测目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术

    The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    youdao

  • ANIDS是基于异常检测技术入侵检测系统两个方面实现异常检测

    This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .

    youdao

  • 针对异常发现技术模式匹配技术各有利弊特点,设计了技术综合运用网络入侵检测系统

    On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.

    youdao

  • 利用数据挖掘技术审计数据加以分析,总结出一些正常模式,用来进行异常检测,将有助于提高入侵检测系统检测准确性和完备性。

    Use data mining methods to analyze the audit data and provide anomaly detection based on the generated normal patterns, this method can improve the performance of intrusion detection system.

    youdao

  • 利用数据挖掘技术审计数据加以分析,总结出一些正常模式,用来进行异常检测,将有助于提高入侵检测系统检测准确性和完备性。

    Use data mining methods to analyze the audit data and provide anomaly detection based on the generated normal patterns, this method can improve the performance of intrusion detection system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定