• 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 系统模型综合了基于异常行为入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 给出了针对无线网络入侵检测模型网络异常行为检测策略

    Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.

    youdao

  • 其中规则包含正常行为规则异常行为规则,使得原型系统理论上既实现误用检测也可实现异常检测采用关联规则挖掘模块网络连接数据进行处理。

    The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.

    youdao

  • 思想通过网络审计数据转化为时序数据库,对其进行序列模式挖掘提炼用户行为模式,并由此进行异常检测

    The idea is to transform the net audit data into time series database and mine the sequence pattern to extract the user behavior pattern , and then to use behavior pattern in anomaly detection.

    youdao

  • 异常检测模块,它采用基于统计分析模型检测异常”的网络行为

    But anomaly detection USES based-on statistic analyzed model detection "anomaly" network actions.

    youdao

  • 本文提出的网络行为检测模型可以有效帮助网管人员及时发现网络中的异常行为,为网络管理人员提供便利,具有的实用价值

    The detection model outlined in this paper would be able to help the network managers to find the anomaly behavior, which has high practical value.

    youdao

  • 最后通过自适应边界方法进行检测能够及时发现异常流量行为说明模型应用于网络流量预测可行有效的。

    Finally, abnormal behaviors of network traffic can be found on time through test of adaptive boundary value method, which proves that the model is feasible and effective.

    youdao

  • 流量异常检测,作为一种网络入侵检测方法,存在着如何建立正常行为模型难题

    It is always a difficult problem to erect a model of normal behaviors in the area of network traffic anomaly detection, a method of network intrusion detection.

    youdao

  • 通过网络数据包分析挖掘网络系统中频繁发生行为模式,运用模式相似比较对系统行为进行检测进而自动建立异常误用行为的模式库。

    By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    youdao

  • 针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法异常检测模型QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为检测和响应。

    To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    youdao

  • 针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法异常检测模型QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为检测和响应。

    To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定