• The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.

    运行节点计算机入侵检测系统具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作

    youdao

  • There are mainly four modules in the system: data collection module, syslog analysis module, intrusion detection module, and user interface module.

    系统主要包括四个模块数据采集模块日志分析模块、入侵检测模块用户接口模块。

    youdao

  • According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.

    根据这种思想论文入侵检测基于系统调用入侵检测技术进行了深入分析和讨论。

    youdao

  • It can collect the proofs timely and accomplish the analysis of detection and forensic when intruded. This system makes up the lack of intrusion detection, and prevents hacker attacks effectively.

    在遭受入侵实时地收集可靠证据完成入侵事件检测取证分析弥补了入侵检测的不足,有效地阻止了黑客攻击

    youdao

  • Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system.

    分析现有分布式入侵检测系统拓扑结构基础设计实现自组织的层次式大规模网络入侵检测系统。

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • UML provides an effective means for the analysis and design of collaborative intrusion detection system, which facilitates its integration with other security systems.

    UML协同入侵检测系统分析设计提供有效手段方便其它安全系统的集成

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • So a new kind of intrusion detection technology based on immunological theory is introduced to improve the detection and analysis abilities of the system .

    本文主要研究基于免疫入侵检测技术以期完善系统对入侵检测分析能力

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

  • The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    youdao

  • Performance analysis and experiments demonstrate that the model is scalable, and can dispatch packets reasonably and utilize intrusion detection system 'sources effectively.

    性能分析实验结果表明,改进检测系统具有扩展性,合理分发数据包,充分的利用入侵检测模块的资源。

    youdao

  • Based on detection prevention-data fusion analysis and data mining-response, a layered intrusion prevention system (IPS) model is proposed.

    提出一种检测防御数据融合分析数据挖掘—响应”多检测器数据融合和数据挖掘入侵防御模型

    youdao

  • Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.

    入侵检测过程关键环节进行分析探讨指出入侵检测系统技术要求部署方法。

    youdao

  • Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.

    入侵检测过程关键环节进行分析探讨指出入侵检测系统技术要求部署方法。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定