For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
The security model of the proxy server based on PDRR consists of protection system, detection system, response system, recovery system and expert system.
基于防御-检测-响应-恢复的代理服务器安全模型由防御、检测系统、响应系统、恢复系统和专家系统组成。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
As a security technology, WLAN intrusion detection technology plays an important role in the security of the WLAN network and system.
WLAN入侵检测技术作为一项安全技术,在保证WLAN的网络和系统安全性上起着非常重要的作用。
The invasion detection system is one kind of initiative protection network resources network security system, in recent years, we obtained extensive research and the application.
入侵检测系统是一种主动保护网络资源的网络安全系统,近年来得到了广泛的研究与应用。
This paper advances an invasion detection model in the network security based on multi-sensor data fusion, and introduces in detail the structure of invasion detection system.
提出了网络安全中基于多传感器数据融合技术的入侵检测模型,并对入侵检测系统的体系结构进行了详细介绍。
This paper discusses the security strategy, system protection, intrusion detection, emergency responding system and backup, disaster restore strategy essential for network security protection.
文章介绍了进行网络安全防范所必需的安全策略、系统防护、入侵检测、应急响应体系及备份、灾难恢复策略。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.
提出了一种基于系统调用序列的入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
The thesis analyzes and researches the network security, the biologic immune system, intrusion detection and the network intrusion detection based on artificial immune firstly.
本文首先对网络安全、生物免疫系统、入侵检测以及基于人工免疫的网络入侵检测进行分析研究。
Intrusion Detection System, new domain of Network Security, is a core research area in dynamic Information Security, but it still has many problems, especially in self-completing and self-learning.
入侵检测系统是目前安全领域较新课题,是动态安全领域的核心,但目前仍然存在很多问题,特别是具有自适应能力、能自我学习的入侵检测系统还不完善。
Maximum system security and immediate ground fault detection helps avoids nuisance tripping due to charging currents.
最高的系统安全性和接地故障检测有助于避免由充电电流造成的跳闸。
They provide system security and immediate reliable low level ground fault detection on three-phase AC resistance grounded or grounded electrical distribution systems.
此类继电器能够增加系统安全性,并对三相交流接地电阻或接地配电系统进行可靠的低级接地故障检测。
Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.
入侵检测技术是对原有计算机网络安全机制的合理补充,它的应用极大地扩展了网络和系统安全的防御纵深。
UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.
UML为协同入侵检测系统的分析和设计提供了有效的手段,方便了与其它安全系统的集成。
Packet capture is the key technology of intrusion detection system and network security audit.
网络数据包捕获技术,是实现入侵检测、网络安全审计的关键技术。
This thesis is a part of the Intrusion Detection Alert Management and Intrusion Respond System (IDAMIRS), and it USES the ontology to build the security state part of knowledge base.
本文的研究内容是入侵报警管理与入侵响应系统IDAMIRS中的一部分,采用本体技术建立攻击知识库中的安全状态部分。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
In this paper, the security loopholes in the network and the normal security infrastructure are briefly introduced, and the intrusion detection system is analyzed emphatically.
简要介绍了网络存在的安全漏洞和常规安全体系,重点对入侵检测作了分析。
Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.
通过构建的检测系统模块测试,可以看到该协议确实达到了预期目的:安全性、灵活性和有效性。
The invention discloses a high-speed switching valve and a security detection system using the high-speed switching valve.
本发明公开一种高速开关阀和使用该高速开关阀的安全检测系统。
The Intrusion Detection System as a key technology and important means to protect network security has become a hot research area.
入侵检测系统作为保护网络系统安全的关键技术和重要手段,已经成为当前网络安全研究方面的热点。
Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them.
入侵检测系统是网络安全的重要组成部分,入侵检测系统的评测分析能发现技术的不足及为研究提供改进的方向。
The security detection system comprises a gas supply gas circuit and the high-speed switching valve connected in series in the gas supply gas circuit.
安全检测系统包括供气气路和串联在供气气路中的前述高速开关阀。
The method includes establishing a security checkpoint including a detection system, wherein the detection system includes a chamber defining a passage and includes a plurality of jets.
该方法包括建立具有探测系统的安全检查点,其中该探测系统包括限定通道并具有大量喷口的室。
As one of the important points of information security safeguard system, more and more intrusion detection systems have been used to protect networks.
入侵检测系统作为信息安全保障体系中不可或缺的重要环节,被更多地用于安全防护。
Considering the security situation in coal mine, a novel low power consumption co detection system based on MSP430F149 MCU is designed and developed.
从煤矿的安全形势出发,开发设计了一种基于单片机MSP430F149的CO检测系统。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
应用推荐