The process of intrusion detection is a complex information dealing and identification.
入侵检测的过程是一个复杂的信息处理、识别过程。
Such an IDS has advantages of the high accuracy of detection intrusion, an efficient decision-making process, nevertheless, low consumption of system resource.
这样的入侵检测系统拥有高精确的入侵检测,高效的决策过程,以及系统资源消耗低的优点。
It introduces the design methods of the adaptive intrusion detection system, and it also analyzes the information process flow, the software design principle, and some key technology problems.
阐明了自适应入侵检测系统的设计方法,着重分析了该系统的信息处理流程、软件设计原则、及关键技术问题。
In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.
在进行入侵检测技术的研究中,安全漏洞分类是一个重要和必需的过程。
The specific quantitative analysis about some of the major indices was made, moreover, the process of intrusion and detection was simulated with probability tree.
量化分析了一些主要测试指标,并利用概率树模拟入侵及检测过程。
IDS module mainly introduces the description of the intrusion character, generation process of the rule chains and the realization of the intrusion detection.
入侵检测模块重点介绍了入侵特征的描述、规则链表的生成过程以及该模块的实现流程。
In the artificial immune based intrusion detection systems, mature detectors complete the tolerance and generation process mainly by negative selection algorithm currently.
目前在基于人工免疫的入侵检测系统中,成熟检测器的耐受和生成过程主要采用否定选择算法实现。
Elaborated composition and work process of the model, particularly analyzed the intrusion detection analyzer structure which is the major component of the model.
阐述了该系统的组成和工作过程,详细分析了系统主要构成部件入侵检测分析器的结构。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.
基于进程行为的入侵检测技术是主机防范入侵和检测恶意代码的重要技术手段之一。
Such an IDS has advantages of high accuracy of detection intrusion, an efficient decision-making process, as well as low consumption of system resource.
这样的入侵检测系统拥有高精确的入侵检测、高效的决策过程以及系统资源消耗低的优点。
If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.
如果一个实际的入侵检测系统不对数据进行处理,则无法准确地检测到入侵行为。
Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.
对入侵检测过程的各关键环节进行分析和探讨,指出入侵检测系统技术要求和部署方法。
Finally, a distributed model of intelligent intrusion detection based on the human immune system is raised, and its working process is...
提出了一种基于人体免疫原理的分布式智能入侵检测系统模型和描述了其工作流程。
Aiming at the problems exists in the process of IDS (intrusion detection system) constructing, apply data mining technology to IDS to construct the models automatically.
针对传统入侵检测系统构造过程中存在的种种问题,将数据挖掘技术引人入侵检测系统,实现检测模型构造的自动化。
Aiming to discover and identify intrusion behaviors, IDS is a technology of information discrimination and detection, and, from the data-driven point, also a process of data analysis.
入侵检测就是发现或确定入侵行为存在或出现的动作,它实际上是一种信息识别与检测技术,而从以数据为中心的观点看,入侵检测本身就是一个数据分析过程。
By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.
通过这些数据预处理过程,大大提高了入侵检测系统对于应用层攻击如r2l、U 2r等模式攻击的识别能力,提高了入侵检测系统的性能。
By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.
通过这些数据预处理过程,大大提高了入侵检测系统对于应用层攻击如r2l、U 2r等模式攻击的识别能力,提高了入侵检测系统的性能。
应用推荐