• 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 目前多数商业化入侵检测产品多是采用简单模式匹配技术只能检测己知攻击模式

    Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.

    youdao

  • 采用反常检测统计基于规则检测技术进行入侵检测

    Statistical abnormality examining and examining based on rule are generally accepted in intrusion detection module.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 采用基于单个系统调用的未知攻击入侵检测技术

    It adopts an unknown attacks' detection technology based on single system-call.

    youdao

  • 通过分析各种入侵检测技术我们入侵检测引擎的实现过程中采用协议分析命令解析以及分析统计的方法。

    By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.

    youdao

  • 检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用各种不同检测技术

    This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    youdao

  • 入侵检测系统采用数据挖掘技术已经成为现在研究热点

    Intrusion detection system with data mining technology has become a focus which is explored.

    youdao

  • 本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS技术

    The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    youdao

  • 入侵检测分析技术主要分为滥用入侵检测异常入侵检测目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术

    The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    youdao

  • 扼要阐述了入侵检测数据挖掘技术建立了采用数据挖掘技术入侵检测系统模型

    The intrusion detection and data mining technology are elaborated and the intrusion detection system model is established applying data mining technology.

    youdao

  • 对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原入侵检测技术

    Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    youdao

  • 协议分析目前多数入侵检测系统采用技术用以弥补单纯模式匹配不足

    Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.

    youdao

  • 网闸所采用技术包括数据分片重组协议转化密码学入侵检测病毒以及关键字过滤身份验证审核

    The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.

    youdao

  • 针对一情况,详细讨论了数据挖掘技术入侵检测系统中的应用,提出了采用数据挖掘技术入侵检测系统结构模型。

    To solve this question, the application of the DM technology in IDS is discussed, and the structure of the IDS with the...

    youdao

  • 针对一情况,详细讨论了数据挖掘技术入侵检测系统中的应用,提出了采用数据挖掘技术入侵检测系统结构模型。

    To solve this question, the application of the DM technology in IDS is discussed, and the structure of the IDS with the...

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定