The data model of RIDS information source, the algorithm of intrusion analysis and the composition of sensor, inspector and data warehouse are introduced.
给出了RIDS信息源数据模型,入侵分析算法,传感器、检测器、数据仓库的构成。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The contract covers a wide range of network management services, including network defense, intrusion detection and analysis, remedies and spectrum network management.
合同覆盖了多种网络管理服务,包括网络防御、入侵探测和分析、救援和频谱网络管理。
Other application areas include intrusion detection, web log analysis, database access patterns, and so on.
其他的应用领域还包括侵入检测、Web日志分析、数据库访问模式等等。
Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.
文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。
Most of the intrusion detection is beginning at the analysis of user command sequence.
大多数的入侵检测都会以用户命令序列的分析作为开始。
The network protocol analysis is an essential technique in network intrusion detection.
网络协议分析是网络入侵检测中的一项关键技术。
There are mainly four modules in the system: data collection module, syslog analysis module, intrusion detection module, and user interface module.
系统主要包括四个模块:数据采集模块、日志分析模块、入侵检测模块和用户接口模块。
The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.
运行于节点计算机上的入侵检测系统,具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作。
It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.
在遭受入侵时它能实时地收集可靠的证据,完成入侵事件的检测和取证分析,弥补了入侵检测的不足,有效地阻止了黑客攻击。
This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.
本文在分析现有网络入侵模式匹配BM算法的基础上,提出了改进BM规则匹配算法。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
Through error analysis to prove grey related between analysis and BP network is combined to predict magmatic intrusion range is feasible.
通过误差分析证明,将灰色关联分析与BP网络结合起来进行岩浆侵入范围的预测是可行的。
According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.
根据这种思想,论文对入侵检测和基于系统调用的入侵检测技术进行了深入分析和讨论。
This paper introduces an intrusion detection model based on clustering analysis and realizes an algorithm of K-means which can set up a database of intrusion detection and classify safe levels.
提出了一种基于聚类分析方法构建入侵检测库的模型,实现了按k -平均值方法建立入侵检测库并据此划分安全等级的思想。
This article through the analysis existing intrusion detection technology good and bad points, proposed one kind of improvement cluster algorithm CLOPE to apply to the network intrusion detection.
本文通过分析现有入侵检测技术的优缺点,提出一种改进的聚类算法CLOPE将其应用于网络入侵检测。
Normal activities of the user's non-statistical analysis and found that intrusion of the law.
对用户的非正常活动进行统计分析,发现入侵行为的规律。
And this article makes a detailed analysis of the definition of residence and the understanding of the act of unlawful intrusion.
本文并就住宅的界定、非法侵入行为的理解做了详细的分析。
The specific quantitative analysis about some of the major indices was made, moreover, the process of intrusion and detection was simulated with probability tree.
量化分析了一些主要测试指标,并利用概率树模拟入侵及检测过程。
Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.
在分析现有分布式入侵检测系统拓扑结构基础上,设计实现了自组织的层次式大规模网络入侵检测系统。
Through the analysis, it is shown that the Matsa s extratropical transition and the re-intensification are due to the intrusion of cold air from the upper-level trough into the typhoons circulation.
以一个在陆上长久维持并最终演变成温带气旋的登陆台风“麦莎”为研究对象,通过对其北上变性过程的分析发现,台风与中高纬西风槽的相互作用使得冷空气侵入是其变性加强的原因。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.
UML为协同入侵检测系统的分析和设计提供了有效的手段,方便了与其它安全系统的集成。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
So a new kind of intrusion detection technology based on immunological theory is introduced to improve the detection and analysis abilities of the system .
本文主要研究基于免疫的入侵检测技术,以期完善系统对入侵的检测与分析能力。
The numerical simulation and theoretical analysis for sea water intrusion in coastal region are very important in the theory and practice of the environmental science.
滨海含水层中的海水入侵数值模拟和理论分析,是环境科学中十分重要的理论和实际问题。
The dissertation mainly aims at applying support vector machine (SVM) and kernel principal component analysis (KPCA) to intrusion detection.
本文的主要工作是将支持向量机(SVM)及核主成分分析(KPCA)应用到入侵检测技术中。
The dissertation mainly aims at applying support vector machine (SVM) and kernel principal component analysis (KPCA) to intrusion detection.
本文的主要工作是将支持向量机(SVM)及核主成分分析(KPCA)应用到入侵检测技术中。
应用推荐