Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.
并根据目标对攻击信息进行分类,用LCS算法在同类攻击数据中生成网络病毒的特征。
Having classified the attack information of the attacked objections, one can create the signature of the intrusion data in the same class with LCS (longest common substring) algorithm.
并根据目标对攻击信息进行分类,用LCS算法在同类攻击数据中生成网络病毒的特征。
应用推荐