In addition, this model USES the protocol analysis technology.
模型还采用了协议分析技术。
The network protocol analysis is an essential technique in network intrusion detection.
网络协议分析是网络入侵检测中的一项关键技术。
The application of the protocol analysis technology in IDS is also discussed in this paper.
对协议分析技术在IDS中的应用进行讨论。
In facts SSM is a practical, intuitive and strict formal method for security protocol analysis.
事实证明,串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
A new method of VHF channel access protocol analysis based on semi-Markov model is presented in this paper.
本文提出了一种基于半马尔可夫模型的VHF信道访问协议分析方法。
Strand Space Model (SSM) is a practical, intuitive and strict formal method for security protocol analysis.
串空间模型是分析安全协议的一种实用、直观和严格的形式化方法。
It deeply probes into the packet capture module, packet filter module and protocol analysis module of a IDS.
设计了一个入侵检测系统的基本框架,并深入探讨了其中的包捕获机制、包过滤机制和协议分析机制。
One of the most commonly used methods for qualitative research in educational psychology is protocol analysis.
在教育心理学中最常用的定性研究方法是协议分析法。
The performance of 1394 emluator driver is analyzed and summarized with 1394 protocol analysis device in the end.
最后结合1394协议分析仪对该驱动的性进行了分析与总结。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.
在整个设计中作者分析和实现了网络数据包捕获技术、协议分析技术和数据库存储。
Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.
协议分析是目前多数入侵检测系统所采用的技术,用以弥补单纯的模式匹配的不足。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Compared with the original concept, the new approach is more formal and can make protocol analysis easier both by hand and automatically.
与原有技术相比,该方法更为形式化,协议分析人员可以很方便地进行手动分析,并且更有利于协议分析自动化工具的实现。
These provide a combination of both capturing and decoding content for you, often performing the bulk of the protocol analysis process for you.
这些工具能够帮您捕捉和解码数据包,通常也能为您执行大多数的协议分析。
The intelligent E-mail processing, which is based on the packet filtering and protocol analysis, makes the encryption and signature intelligent.
智能邮件信息处理基于数据包过滤和协议分析处理技术,实现了邮件加密,签名的智能化。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
This paper introduced one method called protocol analysis due to the high false acceptance rate and high alarm rate caused by pattern match algorithm.
针对模式匹配算法带来的高漏报率和误报率,引入了协议分析的方法。
The study used the protocol analysis showed that the framework is a kind of knowledge structure and an effective heuristic strategy of problem solving.
本文采用口语报告分析所进行的研究表明该框架是一种问题求解方面的知识结构和有效的启发式求解策略。
It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.
分析引擎使用了协议分析和模式匹配相结合的检测方法以及改进了的匹配算法,提高了检测速度。
Computer network course is the key lesson in relative speciality of higher schools, and protocol analysis is a main link in the teaching system of computer.
计算机网络基础课程是高等院校计算机相关专业的重点课程,网络协议分析是计算机网络教学体系当中的一个重要环节。
And according to Protocol Analysis detection, it can flag the anomaly traffic, and detect some attack variations, and resist attackers' obfuscation attempts.
利用协议分析技术发现网络中的异常报文,标识出未知攻击,发现攻击者使用的躲避技术和变种攻击。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
The detailed analysis of data packet in TCP/IP protocol suite is given out. On the basis of it, a layered protocol analysis module is designed and realized in this paper.
论文对TCP/IP协议中数据封装的过程进行了详细的分析,并在此基础上设计和实现了一个分层的协议分析模块。
IIC bus protocol analysis on the basis of a detailed description in the text adopted by the IIC module DM642 video decoder chip register configuration, calibration process.
在分析IIC总线协议的基础上,文中详细叙述了DM 642通过IIC模块对视频编解码芯片的寄存器进行配置、校验的流程。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
Participation in the overall program requirement analysis, monitoring center, protocol analysis module, flow filtration module, intrusion detection module analysis and design.
参与整体方案需求分析,进行监控中心、协议分析模块、流过滤模块、入侵检测模块的分析与设计。
Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
吉姆团队采取了三种不同的分析方法——意图治疗分析,改良的意图治疗分析,以及居前协议分析。
Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
吉姆团队采取了三种不同的分析方法——意图治疗分析,改良的意图治疗分析,以及居前协议分析。
应用推荐