Through the comparison of the results from the experiment and wavelet analysis, it shows that network-wide traffic anomaly detection based on subspace method is more simple and effective.
通过实验结果与小波分析结果的对比,证明了基于子空间方法的大规模网络流量异常检测是一种既简单又高效的方法。
The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.
数据分析融合了异常检测和误用检测两种方法,提出了相应的检测模型,并引入了滤噪函数。
And according to Protocol Analysis detection, it can flag the anomaly traffic, and detect some attack variations, and resist attackers' obfuscation attempts.
利用协议分析技术发现网络中的异常报文,标识出未知攻击,发现攻击者使用的躲避技术和变种攻击。
The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.
随着网络规模和速度的增加,大规模网络异常发现要求检测算法能够在无保留状态或者少保留状态下对G比特级的海量网络业务量数据进行实时在线分析。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
For the purpose of protecting system resource, process behaviors anomaly at runtime was analyzed and summarized, and a program anomaly detection approach was put forward based on behaviors analysis.
使用这些方法调用系统资源,可以有效地提高程序开发效率,实现更复杂的程序功能,使程序具有较高的专业水平,同时也给出具体实例。
For the purpose of protecting system resource, process behaviors anomaly at runtime was analyzed and summarized, and a program anomaly detection approach was put forward based on behaviors analysis.
使用这些方法调用系统资源,可以有效地提高程序开发效率,实现更复杂的程序功能,使程序具有较高的专业水平,同时也给出具体实例。
应用推荐