• Deepen our understanding of the intrusion detection system works.

    加深理解入侵检测系统工作方式

    youdao

  • Finally, we design an immunity based on the intrusion detection system with above-mentioned technology.

    最后,在综合上述技术基础设计基于免疫机制入侵检测系统

    youdao

  • The paper also expatiates on the main structure of the intrusion detection system and the composing module designation.

    阐述入侵检测系统总体结构部署以及组成模块相应结构设计。

    youdao

  • To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.

    针对这些问题本文提出了基于粗糙集理论的入侵检测系统方法。

    youdao

  • The Intrusion Detection System as a key technology and important means to protect network security has become a hot research area.

    入侵检测系统作为保护网络系统安全关键技术重要手段已经成为当前网络安全研究方面热点

    youdao

  • With the internet used increasingly, more and more people attach importance to the intrusion detection system based on network (NIDS).

    随着因特网应用日益普及,基于网络入侵检测越来越受到重视。

    youdao

  • Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.

    第三章介绍网络协议基础常见攻击方法原理入侵检测系统规范标准

    youdao

  • On the basis of analyzing the intrusion detection system existing, this paper has proposed an intrusion detection system based on classification rules.

    本文分析现有入侵检测系统基础上提出基于分类规则的入侵检测系统。

    youdao

  • The intrusion detection and data mining technology are elaborated and the intrusion detection system model is established applying data mining technology.

    扼要阐述了入侵检测数据挖掘技术建立了采用数据挖掘技术入侵检测系统模型

    youdao

  • The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory detectors.

    使用筛选算法生成检测规则,并不断地进行检测规则优化以剔除冗余的检测规则,保留高效的检测规则。

    youdao

  • The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.

    运行节点计算机入侵检测系统具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作

    youdao

  • The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测。

    youdao

  • The research in the paper has definite theoretic and practical value in the field of intrusion detection; it is a useful reference for designing the intrusion detection system.

    本文研究工作入侵检测领域具有一定理论实用价值,可入侵检测系统设计提供参考

    youdao

  • In this paper, the security loopholes in the network and the normal security infrastructure are briefly introduced, and the intrusion detection system is analyzed emphatically.

    简要介绍了网络存在安全漏洞常规安全体系,重点入侵检测了分析。

    youdao

  • Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.

    入侵检测过程关键环节进行分析探讨指出入侵检测系统技术要求部署方法。

    youdao

  • This text has firstly introduces the classification of the intrusion detection system, the current research circumstance, the trend of development and the technology used mostly.

    本文首先介绍了入侵检测系统分类当前研究现状,以及使用主要技术发展趋势

    youdao

  • False positives and false negatives is one of the questions on Influencing the intrusion detection system quality, must use the effective method and the way to solve this problem.

    漏报影响入侵检测质量问题之一必须采用有效方法途径解决入侵事件的误报、漏报。

    youdao

  • In order to improve the performance of intrusion detection system, the paper will be integrated and coordinated to achieve optimal thinking into the intrusion detection system in the realization.

    为了提高入侵检测系统性能本文集成性协同从而达到优化思想引入到入侵检测系统的实现中。

    youdao

  • This paper analyzes the problems existing in current intrusion detection system, and probes into the application of passive fingerprinting identification technology in the intrusion detection system.

    分析当前入侵检测系统存在问题探讨被动指纹识别技术入侵检测系统中的应用

    youdao

  • In this paper, it establishes a honeypot system that combined the intrusion detection system, achieve an effective connection, propose a practical solution and carry out the design and implementation.

    本文主要研究建立有效蜜罐系统实现入侵检测系统的有效连接为目的,提出了一个切实可行解决方案进行设计与实现。

    youdao

  • The first tools for meeting these requirements are system auditing and host-based intrusion detection.

    满足这些需求第一工具系统审计基于主机入侵检测

    youdao

  • This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.

    冷战时期侵入侦测系统旨在周围环境融为一体,它能够探测300之外的任何活动物体

    youdao

  • Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.

    可以证明,Snort市面上最好易用或许也是最便宜的入侵检测系统。

    youdao

  • Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.

    入侵检测系统保护网络系统安全关键技术重要手段,是网络安全领域研究热点

    youdao

  • Host intrusion detection system (HIDS) is very important in the field of protecting the host.

    主机入侵检测系统保护主机方面起着非常重要作用。

    youdao

  • Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.

    探讨免疫学基本原理基础提出了基于免疫学的代理系统用于联网计算机的入侵检测反应

    youdao

  • Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.

    实验表明系统已知攻击模式具有很高检测对未知攻击模式具有一定检测能力。

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定