• 但是实际中的应用仍然局限于异常检测误用检测

    But, it is limited to use anomaly detection and misuse detection in practice.

    youdao

  • 论文提出了有效误用检测方法实现了原型系统

    The paper proposes an effective detecting method and constructs a prototype system.

    youdao

  • 系统实现了误用检测异常检测攻击追踪三个方面的功能

    This system has three functions: misused detection, anomaly detection, and attack source traceback.

    youdao

  • 网络入侵检测算法方面本文异常误用检测算法进行了研究

    On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    youdao

  • 根据入侵检测原理不同,入侵检测分为误用检测和异常检测两种。

    According to the differences of intrusion detection theory, it includes misuse-based detection and anomaly-based intrusion.

    youdao

  • 当前入侵检测技术主要有基于规则的误用检测基于统计异常检测

    The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.

    youdao

  • 仿真结果表明,在大多数情况下学习调整知识模型能够提高误用检测系统检测

    Test results displayed that, under most circumstances, system detection rate was increased when the attack knowledge model was adjusted after learning.

    youdao

  • 测试结果表明经过模糊变换恶意代码能够逃避大部分基于误用检测恶意代码对抗工具。

    The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.

    youdao

  • 数据分析融合了异常检测误用检测两种方法提出相应检测模型引入了函数

    The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.

    youdao

  • 入侵检测技术原理分为异常检测误用检测检测内容分为主机入侵检测网络入侵检测技术。

    On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    youdao

  • 误用检测技术优点检测准确率,缺点是依赖性强,不易移植维护工作量对于未知的攻击束手无策

    The weaknesses are having strongly dependence, not easy to transplant, great maintenance work, and can not detect the unknown attack.

    youdao

  • 其中规则包含正常行为规则异常行为规则,使得原型系统理论上既实现误用检测也可实现异常检测采用关联规则挖掘模块网络连接数据进行处理。

    The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.

    youdao

  • 入侵检测主要目标用于检测非授权误用以及系统内部外部入侵行为。

    The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    youdao

  • 通过构建状态其中提取出相关信息,不仅可以同时兼顾基于误用基于异常的两种检测方法而且使得它们获得更好检测效果

    By constructing state machine and get information from it, this approach can contain both anomaly-based and misuse-based intrusion detection methods, and gain the better detection capability.

    youdao

  • 误用入侵检测技术重要一个环节模式匹配目前模式匹配主要是报文中特征字符串的匹配。

    Misuse intrusion testing technology is the most important link in a pattern matching the current model of matching reported mainly on the text of character string matching.

    youdao

  • 入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    youdao

  • 实验证明,在若干子网组成大规模网络中,方法可以高效检测任意一个子网内是否存在网络误用

    Proved by the experiment, put into the large-scale network composed by several subnets, this method can detect the misuse of any subnet with a high efficiency.

    youdao

  • 摘要入侵特征值识别发现算法误用入侵检测中的关键技术

    Absrtact: Invasion eigenvalue and discovery algorithm are the key technologies to misuse intrusion detection technology.

    youdao

  • 系统在设计检测部分时,采用两种检测模式误用模式异常模式。

    The two popular detection modes, Misuse mode and Anomaly mode, have been taken into the design of detection part of the Agent.

    youdao

  • 入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测

    The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    youdao

  • 检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用的各种不同检测技术。

    This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    youdao

  • 实验证明,在若干子网组成大规模网络中,方法可以高效地检测任意一子网内是否存在网络误用

    Proved by the experiment, put into the large-scale network composed by several subnets, this method can detect the misuse of any subnet wit...

    youdao

  • 定义误用入侵检测系统安全级别通过预警原理安全级别入侵检测系统可以实现对未知入侵预防作用。

    The safety level of misuse IDS is defined and the IDS of lower safety level may prevent unknown intrusion from damage by the early-alert principle.

    youdao

  • 通过网络数据包分析挖掘出网络系统中频繁发生行为模式,运用模式相似比较对系统的行为进行检测进而自动建立异常和误用行为的模式库。

    By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    youdao

  • 文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    youdao

  • 文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定