• This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.

    本篇论文针对当前网络入侵检测系统(IDS)检测规则提出了一个具有弹性的、实时的,动态调整入侵规则的方案。

    youdao

  • In this paper, a novel real-time and dynamical rule generation method for network intrusion detection stream was proposed.

    本文提出了针对网络入侵检测事务流实时动态规则生成方法

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

  • Intrusion detection is an initiative, active and real time network security technology. It has been studied widely.

    入侵检测作为一种主动积极实时动态的网络安全防范技术,目前得到广泛研究

    youdao

  • Usually, the signatures are founded manually, which decreases the accuracy and the real-time capability of intrusion detection system.

    通常情况下攻击签名都是手动创建使入侵检测实时性准确性大大降低,影响了入侵检测的性能。

    youdao

  • As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.

    入侵检测作为一种主动安全防护技术提供内部攻击外部攻击误操作实时保护。

    youdao

  • Simply use the traditional technique based on fuzzy reasoning or expert system in intrusion detection system can not satisfy real-time and accuracy requirements.

    利用传统基于模糊推理规则匹配的专家系统其进行入侵检测不能满足系统的实时性准确度要求。

    youdao

  • FPGA technology has become widely used for real-time network intrusion detection.

    FPGA技术已经被广泛用于实时网络入侵监测

    youdao

  • OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描是防止系统遭受OS漏洞攻击重要手段

    youdao

  • With the traditional security mechanisms compared, Intrusion detection is treatment after program, with intelligent control, real-time detection, dynamic response, easy configuration, etc.

    传统预防性安全机制相比入侵检测一种事后处理方案具有智能监控实时探测动态响应易于配置等特点

    youdao

  • In chapter 4, a new data mining-based Adaptive Models Generation (AMG) is introduced. AMG is a real-time architecture for implementing data mining-based intrusion detection system.

    第四章:介绍基于数据挖掘自适应模型生成(amg),AMG提供了一个基于数据挖掘的实时入侵检测结构。

    youdao

  • In chapter 4, a new data mining-based Adaptive Models Generation (AMG) is introduced. AMG is a real-time architecture for implementing data mining-based intrusion detection system.

    第四章:介绍基于数据挖掘自适应模型生成(amg),AMG提供了一个基于数据挖掘的实时入侵检测结构。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定