This information can, in turn, help to determine network misuse, its nature, and its source.
这些信息可以有助于判断网络的误用、它的性质,它的来源。
The security problem resulting from internal computer network misuse is becoming even more difficult in the researching field of network security management.
由内部网络误用引起的安全问题已日益成为网络安全管理研究领域中的一个难题。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
Proved by the experiment, put into the large-scale network composed by several subnets, this method can detect the misuse of any subnet with a high efficiency.
实验证明,在由若干子网组成的大规模网络中,该方法可以高效地检测出任意一个子网内是否存在网络误用。
The neural network is trained and applied to misuse intrusion detection cases.
对混合网络进行训练后,将该网络用于滥用入侵检测。
Proved by the experiment, put into the large-scale network composed by several subnets, this method can detect the misuse of any subnet wit...
实验证明,在由若干子网组成的大规模网络中,该方法可以高效地检测出任意一个子网内是否存在网络误用。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
应用推荐