You know that Snort is an intrusion detection system, but how does it detect intrusion?
您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
Traditionally, intrusion detection systems detect intrusions at the operating system(OS)level.
传统的入侵检测系统方法是在操作系统级检测入侵。
It is difficult to detect effectively these distributed attacks by the current intrusion detection approaches.
现有的入侵检测方法难以有效地检测这种分布式的入侵行为。
Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.
入侵检测技术可以在网络系统受到损害前对入侵行为做出拦截和响应。
In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.
计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Now, most commercial intrusion detection products which adopt simple pattern matching technology only can detect known attacking patterns.
目前多数商业化的入侵检测产品多是采用简单模式匹配技术,只能检测出己知的攻击模式。
Intrusion detection which is the most important initiative recovery security technology can detect not only the outer but also the inner intrusion.
入侵检测作为一种最重要的主动防御技术不但能检测外来的攻击还能检测来自内部的入侵。
Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks.
现存的入侵检测系统缺乏从先前所观测到的进攻进行概括并检测已知攻击的细微变化的能力。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
In order to detect and trace the intrusion, an architecture for intrusion detection based intelligent agent and a distributed trace algorithm are presented.
为了能有效地检测和跟踪入侵行为,这里提出了一个基于智能代理的入侵检测系统的体系结构和分布跟踪算法。
The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测系统(IDS)的主要目标是检测计算机系统内部或外部入侵者的非授权使用、误用和滥用。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
Intrusion detection as a new security means is used to detect unwanted attempts at accessing, manipulating, or disabling of computer systems thus can greatly enhance the network security.
入侵检测作为一种全新的安全手段,用于检测对电脑系统非预期的访问、控制和破坏尝试,可以使网络的安全性得到很大的提高。
If a rogue reporter were to hack into someone's voicemail, is there any way to detect the intrusion?
如果一个无良的记者试图侵入某用户的语音信箱,有没有什么办法来发现这一行径呢?
This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.
这款冷战时期的侵入侦测系统旨在与周围环境融为一体,它能够探测300米之外的任何活动物体。
IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.
基于数据挖掘的入侵检测系统具有一定的自学习性和自完善性,可以检测已知或未知的入侵行为。
The model with the functions of self-learning and self-completing can detect the known and novel intrusion activities.
该模型可以发现已知的和未知的滥用入侵和异常入侵活动,具有自学习、自完善功能。
The combined neural networks will be used to detect the network intrusion, afterwards the experiment result shows the methods are valid.
用该组合神经网络进行网络入侵检测,实验结果表明该组合方法是一种有效的入侵检测方法。
Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.
实验表明,该系统对已知攻击模式具有很高的检测率,对未知攻击模式也具有一定的检测能力。
The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
This method can detect intrusion action on system level, network level and user level, simulation experiment indicates the method has very highly detection ability and robust ability.
该方法能够检测系统级、网络级和用户级的入侵行为,模拟实验表明该方法有很强的检测能力和较好的鲁棒性。
Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.
网络入侵诱控是一种可以检测分析并对入侵行为做出主动控制的安全新技术。
Combined with Q - learning, action tracing and intrusion forecasting, this model is applied to detect and response to the unknown intrusion.
该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。
The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.
二是在数据包与入侵规则进行模式匹配时,使用什么样的模式匹配算法来快速准确地检测出入侵行为。
The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.
二是在数据包与入侵规则进行模式匹配时,使用什么样的模式匹配算法来快速准确地检测出入侵行为。
应用推荐