Deepen our understanding of the intrusion detection system works.
加深理解了入侵检测系统的工作方式。
Finally, we design an immunity based on the intrusion detection system with above-mentioned technology.
最后,在综合上述技术的基础上,设计了基于免疫机制的入侵检测系统。
The paper also expatiates on the main structure of the intrusion detection system and the composing module designation.
阐述了该入侵检测系统的总体结构部署以及各组成模块的相应结构设计。
To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.
针对这些问题,本文提出了一种基于粗糙集理论的入侵检测系统的方法。
The Intrusion Detection System as a key technology and important means to protect network security has become a hot research area.
入侵检测系统作为保护网络系统安全的关键技术和重要手段,已经成为当前网络安全研究方面的热点。
With the internet used increasingly, more and more people attach importance to the intrusion detection system based on network (NIDS).
随着因特网应用的日益普及,基于网络的入侵检测越来越受到重视。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
On the basis of analyzing the intrusion detection system existing, this paper has proposed an intrusion detection system based on classification rules.
本文在分析现有入侵检测系统的基础上,提出了基于分类规则的入侵检测系统。
The intrusion detection and data mining technology are elaborated and the intrusion detection system model is established applying data mining technology.
扼要阐述了入侵检测和数据挖掘技术,并建立了采用数据挖掘技术的入侵检测系统模型。
The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory detectors.
它使用负筛选算法来生成检测规则,并不断地进行检测规则优化以剔除冗余的检测规则,保留高效的检测规则。
The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.
运行于节点计算机上的入侵检测系统,具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
The research in the paper has definite theoretic and practical value in the field of intrusion detection; it is a useful reference for designing the intrusion detection system.
本文的研究工作在入侵检测领域具有一定的理论和实用价值,可为入侵检测系统的设计提供参考。
In this paper, the security loopholes in the network and the normal security infrastructure are briefly introduced, and the intrusion detection system is analyzed emphatically.
简要介绍了网络存在的安全漏洞和常规安全体系,重点对入侵检测作了分析。
Intrusion detection on the key aspects of the process of analysis and discussion, pointed out that the intrusion detection system technical requirements and deployment methods.
对入侵检测过程的各关键环节进行分析和探讨,指出入侵检测系统技术要求和部署方法。
This text has firstly introduces the classification of the intrusion detection system, the current research circumstance, the trend of development and the technology used mostly.
本文首先介绍了入侵检测系统的分类,当前的研究现状,以及使用的主要技术和发展趋势。
False positives and false negatives is one of the questions on Influencing the intrusion detection system quality, must use the effective method and the way to solve this problem.
误报和漏报是影响入侵检测质量的问题之一,必须采用有效的方法和途径解决入侵事件的误报、漏报。
In order to improve the performance of intrusion detection system, the paper will be integrated and coordinated to achieve optimal thinking into the intrusion detection system in the realization.
为了提高入侵检测系统的性能,本文将集成性和协同性从而达到优化的思想引入到入侵检测系统的实现中。
This paper analyzes the problems existing in current intrusion detection system, and probes into the application of passive fingerprinting identification technology in the intrusion detection system.
分析了当前入侵检测系统所存在的问题,探讨了被动指纹识别技术在入侵检测系统中的应用。
In this paper, it establishes a honeypot system that combined the intrusion detection system, achieve an effective connection, propose a practical solution and carry out the design and implementation.
本文主要研究建立一个有效的蜜罐系统,实现与入侵检测系统的有效连接为目的,提出了一个切实可行的解决方案,并进行了设计与实现。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.
这款冷战时期的侵入侦测系统旨在与周围环境融为一体,它能够探测300米之外的任何活动物体。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
Host intrusion detection system (HIDS) is very important in the field of protecting the host.
主机入侵检测系统在保护主机方面起着非常重要的作用。
Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.
在探讨免疫学基本原理的基础上,提出了基于免疫学的多代理系统,用于联网计算机的入侵检测与反应。
Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.
实验表明,该系统对已知攻击模式具有很高的检测率,对未知攻击模式也具有一定的检测能力。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
应用推荐