• The process of intrusion detection is a complex information dealing and identification.

    入侵检测过程一个复杂信息处理识别过程

    youdao

  • Such an IDS has advantages of the high accuracy of detection intrusion, an efficient decision-making process, nevertheless, low consumption of system resource.

    这样入侵检测系统拥有精确入侵检测高效决策过程,以及系统资源消耗优点

    youdao

  • It introduces the design methods of the adaptive intrusion detection system, and it also analyzes the information process flow, the software design principle, and some key technology problems.

    阐明适应入侵检测系统设计方法着重分析了系统的信息处理流程软件设计原则关键技术问题。

    youdao

  • In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.

    进行入侵检测技术研究安全漏洞分类一个重要必需的过程。

    youdao

  • The specific quantitative analysis about some of the major indices was made, moreover, the process of intrusion and detection was simulated with probability tree.

    量化分析一些主要测试指标利用概率模拟入侵检测过程

    youdao

  • IDS module mainly introduces the description of the intrusion character, generation process of the rule chains and the realization of the intrusion detection.

    入侵检测模块重点介绍了入侵特征描述规则链表生成过程以及模块的实现流程。

    youdao

  • In the artificial immune based intrusion detection systems, mature detectors complete the tolerance and generation process mainly by negative selection algorithm currently.

    目前基于人工免疫入侵检测系统中,成熟检测器耐受生成过程主要采用否定选择算法实现。

    youdao

  • Elaborated composition and work process of the model, particularly analyzed the intrusion detection analyzer structure which is the major component of the model.

    阐述了该系统组成工作过程详细分析了系统主要构成部件入侵检测分析器结构

    youdao

  • The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    youdao

  • Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.

    基于进程行为入侵检测技术主机防范入侵检测恶意代码的重要技术手段之一

    youdao

  • Such an IDS has advantages of high accuracy of detection intrusion, an efficient decision-making process, as well as low consumption of system resource.

    这样入侵检测系统拥有精确入侵检测、高效决策过程以及系统资源消耗优点

    youdao

  • If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.

    如果一个实际入侵检测系统不对数据进行处理,则无法准确地检测到入侵行为

    youdao

  • Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.

    入侵检测过程关键环节进行分析探讨指出入侵检测系统技术要求部署方法。

    youdao

  • Finally, a distributed model of intelligent intrusion detection based on the human immune system is raised, and its working process is...

    提出一种基于人体免疫原理分布式智能入侵检测系统模型描述了工作流程

    youdao

  • Aiming at the problems exists in the process of IDS (intrusion detection system) constructing, apply data mining technology to IDS to construct the models automatically.

    针对传统入侵检测系统构造过程存在种种问题数据挖掘技术引人入侵检测系统,实现检测模型构造自动化

    youdao

  • Aiming to discover and identify intrusion behaviors, IDS is a technology of information discrimination and detection, and, from the data-driven point, also a process of data analysis.

    入侵检测就是发现确定入侵行为存在或出现的动作,它实际上信息识别检测技术,而数据为中心的观点看,入侵检测本身就是一个数据分析过程

    youdao

  • By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.

    通过这些数据预处理过程大大提高入侵检测系统对于应用层攻击r2l、U 2r等模式攻击识别能力,提高了入侵检测系统性能

    youdao

  • By these data pretreatment process, greatly improved the ability of distinguish application-level attack such as R2L, U2R attacks, intrusion detection system's performance was rised.

    通过这些数据预处理过程大大提高入侵检测系统对于应用层攻击r2l、U 2r等模式攻击识别能力,提高了入侵检测系统性能

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定