在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
目前多数商业化的入侵检测产品多是采用简单模式匹配技术,只能检测出己知的攻击模式。
Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.
采用反常检测统计和基于规则的检测技术进行入侵检测。
Statistical abnormality examining and examining based on rule are generally accepted in intrusion detection module.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
采用了基于单个系统调用的未知攻击入侵检测技术。
It adopts an unknown attacks' detection technology based on single system-call.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
对检测入侵方法中的两种方法——异常入侵检测和误用入侵检测进行了描述,介绍了这两种方法中采用的各种不同的检测技术。
This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.
在入侵检测系统中采用数据挖掘技术,已经成为现在研究的热点。
Intrusion detection system with data mining technology has become a focus which is explored.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
扼要阐述了入侵检测和数据挖掘技术,并建立了采用数据挖掘技术的入侵检测系统模型。
The intrusion detection and data mining technology are elaborated and the intrusion detection system model is established applying data mining technology.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
协议分析是目前多数入侵检测系统所采用的技术,用以弥补单纯的模式匹配的不足。
Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.
网闸所采用的技术包括数据分片重组、协议转化、密码学、入侵检测、病毒以及关键字过滤、身份验证及审核等。
The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.
针对这一情况,详细讨论了数据挖掘技术在入侵检测系统中的应用,提出了采用数据挖掘技术的入侵检测系统的结构模型。
To solve this question, the application of the DM technology in IDS is discussed, and the structure of the IDS with the...
针对这一情况,详细讨论了数据挖掘技术在入侵检测系统中的应用,提出了采用数据挖掘技术的入侵检测系统的结构模型。
To solve this question, the application of the DM technology in IDS is discussed, and the structure of the IDS with the...
应用推荐