We propose a multi-agent based intrusion detection system (MAIDS) for wireless sensor networks.
提出一种无线传感器网络入侵检测解决方案—MAIDS。
The main contributions in this paper are as follows:1. Research and build a state-based intrusion detection system (IDS); 2.
本论文的工作主要体现在如下方面:1。研究并搭建基于状态迁移的入侵检测系统;
This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.
该文应用SVM的分类特性来识别网络攻击行为,提出了基于SVM的入侵检测方法。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.
该文在分析基于主机和基于网络的入侵检测系统的特点的基础上,提出了一种电子商务安全审计系统的设计。
In chapter 4, a new data mining-based Adaptive Models Generation (AMG) is introduced. AMG is a real-time architecture for implementing data mining-based intrusion detection system.
第四章:介绍基于数据挖掘自适应模型生成(amg),AMG是提供了一个基于数据挖掘的实时入侵检测结构。
To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.
针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.
在探讨免疫学基本原理的基础上,提出了基于免疫学的多代理系统,用于联网计算机的入侵检测与反应。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
Through setting up the model characteristic storehouse and describing the systematic procedure, this paper states its principle based on the description of the frame of Intrusion Detection system.
在入侵检测系统框架的基础上,通过建立模式匹配的模型特征库和描述系统的流程来说明入侵检测系统的原理。
To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.
针对这些问题,本文提出了一种基于粗糙集理论的入侵检测系统的方法。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
In order to solve these problems, an intrusion detection system model based on AIS is put forward. Detection rules are produced by negative selection algorithm.
为了解决这些问题,提出了一个基于人工免疫原理的入侵检测模型,该模型使用负筛选算法产生检测规则集。
Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.
在分析现有分布式入侵检测系统拓扑结构基础上,设计实现了自组织的层次式大规模网络入侵检测系统。
This paper presents a new intrusion prediction scheme based on case-based reasoning (CBR) for network intrusion detection system (CBRIP).
提出入侵预测技术模型可用于扩展网络入侵检测系统的功能。
In order to overcome the limitations lied at the classic self-non-self thinking, this paper proposes a novel Intrusion Detection System(IDS) based on double-signal inspired by danger theory.
为了克服传统的“自我—非我”模型的不足,设计了一种新的基于危险理论的双信号协同入侵检测模型。
In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.
提出了一种基于系统调用序列的入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式。
File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.
文件系统完整性校验是一种基于主机的入侵检测技术,可以检测出入侵者对主机文件的非法修改。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge.
为了克服入侵检测系统存在着在先验知识较少情况的推广能力差的问题,提出了基于粗糙集理论的入侵检测方法。
This Paper designed a distributed intrusion detection system, which based on the component.
本文设计了一种基于部件的分布式入侵检测系统。
In this paper, a data mining-based network intrusion detection system model is introduced.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.
根据这种思想,论文对入侵检测和基于系统调用的入侵检测技术进行了深入分析和讨论。
The thesis analyzes and researches the network security, the biologic immune system, intrusion detection and the network intrusion detection based on artificial immune firstly.
本文首先对网络安全、生物免疫系统、入侵检测以及基于人工免疫的网络入侵检测进行分析研究。
Intrusion detection system based on network is differentiate self from nonself among huge network data.
基于网络的入侵检测系统就是要在大量的网络数据中区分出“自我”和“非我”。
Intrusion detection system based on network is differentiate self from nonself among huge network data.
基于网络的入侵检测系统就是要在大量的网络数据中区分出“自我”和“非我”。
应用推荐