The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.
运行于节点计算机上的入侵检测系统,具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作。
There are mainly four modules in the system: data collection module, syslog analysis module, intrusion detection module, and user interface module.
系统主要包括四个模块:数据采集模块、日志分析模块、入侵检测模块和用户接口模块。
According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.
根据这种思想,论文对入侵检测和基于系统调用的入侵检测技术进行了深入分析和讨论。
It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.
在遭受入侵时它能实时地收集可靠的证据,完成入侵事件的检测和取证分析,弥补了入侵检测的不足,有效地阻止了黑客攻击。
Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.
在分析现有分布式入侵检测系统拓扑结构基础上,设计实现了自组织的层次式大规模网络入侵检测系统。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.
UML为协同入侵检测系统的分析和设计提供了有效的手段,方便了与其它安全系统的集成。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
So a new kind of intrusion detection technology based on immunological theory is introduced to improve the detection and analysis abilities of the system .
本文主要研究基于免疫的入侵检测技术,以期完善系统对入侵的检测与分析能力。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
Performance analysis and experiments demonstrate that the model is scalable, and can dispatch packets reasonably and utilize intrusion detection system 'sources effectively.
性能分析和实验结果表明,改进的检测系统具有扩展性,能合理的分发数据包,充分的利用入侵检测模块的资源。
Based on detection prevention-data fusion analysis and data mining-response, a layered intrusion prevention system (IPS) model is proposed.
提出一种“检测防御—数据融合分析和数据挖掘—响应”多检测器数据融合和数据挖掘入侵防御模型。
Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.
对入侵检测过程的各关键环节进行分析和探讨,指出入侵检测系统技术要求和部署方法。
Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.
对入侵检测过程的各关键环节进行分析和探讨,指出入侵检测系统技术要求和部署方法。
应用推荐