Secondly, on the basis of introduction to the normal intrusion methods and state of art of network IDS, contemporary challenges and trends are discussed about IDS.
其次,在介绍常用入侵手段和网络入侵检测系统研究现状的基础上,讨论了当前入侵检测技术面临的挑战和发展趋势展望。
Skyhook maps the locations of wireless networks by driving around with a Wi-Fi antenna and software that automatically records network IDs and signal strength (a practice known as war-driving).
Skyhook在地图上标出无线网络的位置,是通过驱动附带的Wi - Fi天线和软件,软件可以自动记录网络ID和信号强度约(如网路应用驱动的做法)。
For example, the database requires that network IDs not exceed eight characters in length, but we'll also enforce our business rule that a network ID must be no fewer than six characters in length.
如,数据库要求网络ID长度不超过8个字符,但是,我们也会加强我们的业务规则,要求网络ID的长度必须不小于6位字符。
There were major DBMS offerings on other mainframes also: Honeywell, which had acquired GE's computer business, continued to offer IDS, and Burroughs had a similar network DBMS called DMS.
在其他大型机上也有主流DBMS产品:收购了GE的计算机业务的Honeywell继续提供IDS,而Burroughs有一个称为DMS的类似网络DBMS。
He used a network orientation to build his design, and the result was a DBMS called the Integrated Data Store (IDS) that was designed to run under GE's GECOS operating system.
他使用了网络导向来构建其设计,结果是一个称为IntegratedDataStore (IDS)的DBMS,被设计为在GE的GECOS操作系统下运行。
Refer to the Choosing a Replication Network Topology topic in the IDS Information Center for more details.
参阅IDS信息中心中的选择一个复制网络拓扑主题了解更多细节。
As an example, IDS monitors and records significant events on a specific computer or from the network examining data and providing an "after the fact" forensic ability to identify suspect activity.
比如说,IDS监视并记录某一特定计算机或来自具有调查数据并能提供识别可疑活动“犯罪之后”的侦破能力的网络上的重要事件。
The unique function of IDS makes it play an irreplaceable role in network security system.
IDS独特的作用使它在网络安全体系中占有不可替代的地位。
By scanning the protected network actively and gathering necessary information, this system can dynamically configure IDS to improve detection efficiency.
通过主动扫描被保护网络,获取有效信息,动态地配置入侵检测系统,提高检测效率。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
Intrusion Detection System (IDS) plays an important role in the field of computer network security, its degree of application has expanded a lot.
入侵检测系统(IDS)在计算机网络安全领域起着举足轻重的作用,应用程度比以前有了很大的扩展。
This thesis constructs an IDS based on RBF neural network, which gives the basic thinking of design and the arithmetic, the method of collection and beforehand disposal way of the sample data.
本文主要构建了一种基于RBF神经网络的入侵检测系统,给出了基本的设计思想和算法,以及样本数据的收集和预处理方法。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.
本篇论文针对当前网络入侵检测系统(IDS)的检测规则,提出了一个具有弹性的、实时的,能动态调整入侵规则的方案。
The research and development of IDS has become the important subject about network security.
入侵检测系统的研究和实现已经成为现在网络安全的重要课题。
Although IDS can defend viruses and illegal intrusions effectively on the Internet, it has a performance bottleneck when efficiency is highly count, especially on the high-speed network.
入侵检测系统能有效防御网络上多数病毒和非法入侵,但也存在效率问题,特别是在高速网络环境下对检测效率要求非常高。
The task of deploying IDS on the switch core is to detect the attacking actions from the whole network.
在交换机核心上部署IDS的任务是:检测来自全网的攻击行为。
So it has become the advanced task in research of distributed IDS key technologies in large-scale network.
因此,研究基于大规模网络的分布式ids的关键技术成为当前IDS研究的前沿课题。
This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.
提出了基于数据挖掘的网络入侵检测规则特征值自动发现算法和规则自动生成算法。
Intelligent intrusion detection system written on this paper is the IDS with network session and ANN detection engine.
智能入侵检测系统是指在入侵检测系统中引入网络会话模块和ANN检测引擎的系统。
Both of the IDS have advantages and disadvantages. HIDS is mainly used to protect important host or server and NIDS is mainly responsible to detect and protect entire network segment.
这两种系统各有优缺点,HIDS主要用来保护关键主机或服务器,而NIDS主要是负责监测和保护整个网段。
IDS offers an extra safe defense-line for supporting wireless network.
IDS为支持无线访问的网络提供了一个道额外的安全防线。
The research on intrusion detection system is involved with many respects, such as framework, defense of attack of IDS, detection on high speed network, intelligent detection.
而入侵检测领域则涵盖了从框架、抗攻击、高速网络检测到智能化检测等各个方面。
Considering the performance of the IDS, the network behavior of session streams is studied, and the cost of the system is evaluated.
考虑系统的性能问题,论文对网络中的会话流进行了研究,以使系统的设计更加合理,并利用研究结果评估了系统的复杂度。
Intrusion detection system is an indispensable part of network security. IDS evaluation and testing may discover the weakness of current technology and thus improve on them.
入侵检测系统是网络安全的重要组成部分,入侵检测系统的评测分析能发现技术的不足及为研究提供改进的方向。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
With the frequent occurrences of network oriented intrusion, intrusion detection systems(IDS)have gained more and more recognition and application in network environments.
随着网络入侵事件的日益增多,入侵检测系统(IDS)越来越广泛地应用在网络环境中。
Network Port Detection in Host Detector can be used for detecting intrusion in switched network which IDS can not work exactly.
在主机检测器中的网络端口检测功能,有效的解决了交换式网络中入侵检测系统无法检测的致命弱点。
With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems (IDS) can't any longer meet the need of security.
随着网络攻击手段的日益复杂化、多样化和自动化,传统的入侵检测系统(IDS)己不能满足安全需求。
Firstly this text carries on the analysis to the present condition of the network safety and the application of IDS, then analyzed the existing technology and the challenge which faces with emphasis.
本文首先介绍网络安全现状和入侵检测技术的应用情况,重点分析了现有的技术和面临的挑战。
应用推荐