• You know that Snort is an intrusion detection system, but how does it detect intrusion?

    知道Snort一种入侵检测系统如何检测入侵的呢?

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

  • Traditionally, intrusion detection systems detect intrusions at the operating system(OS)level.

    传统入侵检测系统方法是操作系统检测入侵。

    youdao

  • It is difficult to detect effectively these distributed attacks by the current intrusion detection approaches.

    现有入侵检测方法难以有效地检测这种分布式的入侵行为。

    youdao

  • Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.

    入侵检测技术可以网络系统受到损害对入侵行为做出拦截响应

    youdao

  • In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.

    计算机安全用语,指用以检测入侵行动的种设备,通常是一块带有压力传感器橡皮乙烯垫子,用以检测入侵行动。

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.

    目前多数商业化入侵检测产品多是采用简单模式匹配技术只能检测己知攻击模式

    youdao

  • Intrusion detection which is the most important initiative recovery security technology can detect not only the outer but also the inner intrusion.

    入侵检测作为一重要主动防御技术不但检测外来攻击能检测来自内部的入侵。

    youdao

  • Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks.

    现存入侵检测系统缺乏从先前所观测到进攻进行概括并检测已知攻击的细微变化能力

    youdao

  • The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测主要目标用于检测非授权误用以及系统内部外部的入侵行为。

    youdao

  • In order to detect and trace the intrusion, an architecture for intrusion detection based intelligent agent and a distributed trace algorithm are presented.

    为了能有效地检测跟踪入侵行为,这里提出了一个基于智能代理入侵检测系统的体系结构分布跟踪算法

    youdao

  • The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    youdao

  • Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • Intrusion detection as a new security means is used to detect unwanted attempts at accessing, manipulating, or disabling of computer systems thus can greatly enhance the network security.

    入侵检测作为一种全新安全手段用于检测电脑系统非预期访问控制破坏尝试可以使网络安全性得到很大提高

    youdao

  • If a rogue reporter were to hack into someone's voicemail, is there any way to detect the intrusion?

    如果无良记者试图侵入用户的语音信箱有没有什么办法发现这一行径呢?

    youdao

  • This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.

    冷战时期侵入侦测系统旨在周围环境融为一体,它能够探测300之外的任何活动物体

    youdao

  • IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.

    基于数据挖掘入侵检测系统具有一定自学习性完善性,可以检测已知或未知入侵行为

    youdao

  • The model with the functions of self-learning and self-completing can detect the known and novel intrusion activities.

    模型可以发现已知未知滥用入侵和异常入侵活动具有自学习、完善功能

    youdao

  • The combined neural networks will be used to detect the network intrusion, afterwards the experiment result shows the methods are valid.

    组合神经网络进行网络入侵检测实验结果表明该组合方法种有效的入侵检测方法。

    youdao

  • Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.

    实验表明系统已知攻击模式具有很高检测对未知攻击模式具有一定检测能力。

    youdao

  • The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.

    测试结果表明IIDS可以有效地检测网络入侵行为以及未知攻击模式,达到预期目标

    youdao

  • This method can detect intrusion action on system level, network level and user level, simulation experiment indicates the method has very highly detection ability and robust ability.

    方法能够检测系统网络用户级的入侵行为模拟实验表明方法很强检测能力较好的鲁棒性。

    youdao

  • Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.

    网络入侵一种可以检测分析对入侵行为做出主动控制安全技术

    youdao

  • Combined with Q - learning, action tracing and intrusion forecasting, this model is applied to detect and response to the unknown intrusion.

    模型Q-学习行为意图跟踪入侵预测结合起来,可获得未知入侵行为的检测响应

    youdao

  • The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.

    数据包入侵规则进行模式匹配时,使用什么样的模式匹配算法快速准确地检测出入侵行为。

    youdao

  • The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.

    数据包入侵规则进行模式匹配时,使用什么样的模式匹配算法快速准确地检测出入侵行为。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定