• For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.

    为了加强安全可以考虑所有机器上安装配置入侵检测系统(IDS),例如Snort

    youdao

  • With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.

    模型动态策略管理基础,形成一个防护检测响应为一体的完整安全体系从而主机系统实施综合安全保护

    youdao

  • The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.

    基于防御-检测-响应-恢复代理服务器安全模型防御、检测系统、响应系统、恢复系统专家系统组成。

    youdao

  • Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.

    入侵检测系统保护网络系统安全关键技术重要手段,是网络安全领域研究热点

    youdao

  • As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.

    WLAN入侵检测技术作为一项安全技术,保证WLAN网络和系统安全性上起非常重要作用

    youdao

  • The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.

    入侵检测系统主动保护网络资源的网络安全系统,近年来得到了广泛的研究应用

    youdao

  • This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.

    提出网络安全基于多传感器数据融合技术入侵检测模型对入侵检测系统体系结构进行了详细介绍

    youdao

  • This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.

    文章介绍进行网络安全防范所必需的安全策略系统防护入侵检测应急响应体系备份灾难恢复策略。

    youdao

  • Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.

    专家系统防御系统检测系统交互分别确定安全级别和安全策略检测新的攻击

    youdao

  • In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.

    提出了一种基于系统调用序列入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式

    youdao

  • This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.

    本文首先简要介绍网络安全现状入侵检测技术CORBA 技术,然后给出应用CORBA建立分布式入侵监测系统体系结构

    youdao

  • The thesis analyzes and researches the network security, the biologic immune system, intrusion detection and the network intrusion detection based on artificial immune firstly.

    本文首先网络安全生物免疫系统入侵检测以及基于人工免疫网络入侵检测进行分析研究

    youdao

  • Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.

    入侵检测系统目前安全领域课题,是动态安全领域核心目前仍然存在很多问题特别是具有自适应能力、能自我学习的入侵检测系统还不完善。

    youdao

  • Maximum system security and immediate ground fault detection helps avoids nuisance tripping due to charging currents.

    最高系统安全性接地故障检测有助于避免充电电流造成的跳闸

    youdao

  • They provide system security and immediate reliable low level ground fault detection on three-phase AC resistance grounded or grounded electrical distribution systems.

    此类继电器能够增加系统安全性三相交流接地电阻接地配电系统进行可靠低级接地故障检测

    youdao

  • Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.

    入侵检测技术原有计算机网络安全机制合理补充应用极大地扩展了网络系统安全的防御纵深。

    youdao

  • UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.

    UML协同入侵检测系统分析设计提供有效手段方便其它安全系统的集成

    youdao

  • Packet capture is the key technology of intrusion detection system and network security audit.

    网络数据包捕获技术实现入侵检测网络安全审计关键技术

    youdao

  • This thesis is a part of the Intrusion Detection Alert Management and Intrusion Respond System (IDAMIRS), and it USES the ontology to build the security state part of knowledge base.

    本文的研究内容入侵报警管理入侵响应系统IDAMIRS中的一部分采用本体技术建立攻击知识库中的安全状态部分

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

  • In this paper, the security loopholes in the network and the normal security infrastructure are briefly introduced, and the intrusion detection system is analyzed emphatically.

    简要介绍了网络存在安全漏洞常规安全体系,重点入侵检测了分析。

    youdao

  • Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.

    通过构建检测系统模块测试,可以看到该协议确实达到了预期目的:安全性灵活性有效性

    youdao

  • The invention discloses a high-speed switching valve and a security detection system using the high-speed switching valve.

    发明公开一种高速开关使用高速开关阀的安全检测系统

    youdao

  • The Intrusion Detection System as a key technology and important means to protect network security has become a hot research area.

    入侵检测系统作为保护网络系统安全关键技术重要手段已经成为当前网络安全研究方面热点

    youdao

  • Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them.

    入侵检测系统网络安全重要组成部分入侵检测系统的评测分析发现技术不足为研究提供改进的方向。

    youdao

  • The security detection system comprises a gas supply gas circuit and the high-speed switching valve connected in series in the gas supply gas circuit.

    安全检测系统包括供气串联供气气路中的前述高速开关

    youdao

  • The method includes establishing a security checkpoint including a detection system, wherein the detection system includes a chamber defining a passage and includes a plurality of jets.

    方法包括建立具有探测系统安全检查点其中该探测系统包括限定通道具有大量喷口

    youdao

  • As one of the important points of information security safeguard system, more and more intrusion detection systems have been used to protect networks.

    入侵检测系统作为信息安全保障体系不可或缺重要环节,被更多地用于安全防护。

    youdao

  • Considering the security situation in coal mine, a novel low power consumption co detection system based on MSP430F149 MCU is designed and developed.

    煤矿安全形势出发,开发设计了一基于单片机MSP430F149CO检测系统

    youdao

  • According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.

    基于前面关键技术,第四详细设计基于信息探测网络安全评估系统的方案给出了具体实现的方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定