This paper introduces a method, data fusion, to intrusion detection system (IDS), and presents a new design of DIDS based on data fusion.
本文对分布式入侵检测系统进行了介绍,提出了一种基于数据挖掘以及分布式系统架构的入侵检测系统。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.
这款冷战时期的侵入侦测系统旨在与周围环境融为一体,它能够探测300米之外的任何活动物体。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
The model of Multiple Neural Networks by Fuzzy(MNNF) integral presented in this paper is an effective method to improve the detection performance of network intrusion detection system.
为了进一步提高网络入侵检测系统的检测性能,将模糊积分理论和神经网络技术应用到网络入侵检测中,提出了基于模糊积分的多神经网络融合模型MNNF。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
When applying the algorithm to network behavior intelligent learning of intrusion detection system, the error rate is about 10%.
将该算法应用于入侵检测系统的网络行为智能学习,其误报率仅为10%左右。
This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.
本篇论文针对当前网络入侵检测系统(IDS)的检测规则,提出了一个具有弹性的、实时的,能动态调整入侵规则的方案。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining.
针对这些问题,本文提出了一种基于粗糙集理论的入侵检测系统的方法。
Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.
由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
Not attacking for more overall protection network, intrusion detection system will give play to irreplaceable function.
为更全面的保护网络不受攻击,入侵检测系统应运而生。
The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测系统(IDS)的主要目标是检测计算机系统内部或外部入侵者的非授权使用、误用和滥用。
Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.
代理体系的引入,将基于主机的入侵检测和基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统。
Intrusion detection is an important method to protect system security.
入侵检测是保护系统安全的重要途径。
To the limitation of current intrusion detection models, an idea of formulating an intrusion detection model system (TAIDS) based on the GMTH Two-level algorithm was presented.
针对现有入侵检测系统的检测时间范围具有一定局限性的缺陷,提出了一种基于两水平算法的入侵检测系统模型(TAIDS)。
This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .
ANIDS是基于异常检测技术的入侵检测系统,它从两个方面来实现异常检测。
This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.
该文应用SVM的分类特性来识别网络攻击行为,提出了基于SVM的入侵检测方法。
This paper presents a model of database intrusion detection system, which USES data mining on the audit data in database systems to derive user profiles that describe normal behavior of users.
提出了一种数据库入侵检测模型,利用该模型对数据库审计信息进行挖掘,以发现代表合法用户典型行为的用户轮廓。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
False positives and false negatives is one of the questions on Influencing the intrusion detection system quality, must use the effective method and the way to solve this problem.
误报和漏报是影响入侵检测质量的问题之一,必须采用有效的方法和途径解决入侵事件的误报、漏报。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
An intrusion detection mechanism adapted to the current circumstances, which can enhance the intrusion detection speed and lower the system resources usage.
提出了一种运用得到的规则进行检测的机制,可以提高系统检测的速度,降低系统资源的使用率。
These methods can enhance the accuracy and efficiency of detection, and make intrusion detection system adapt to high-speed network.
这些方法提高了检测准确率和效率,使得入侵检测系统能够适应高速网络环境。
In order to overcome the limitations lied at the classic self-non-self thinking, this paper proposes a novel Intrusion Detection System(IDS) based on double-signal inspired by danger theory.
为了克服传统的“自我—非我”模型的不足,设计了一种新的基于危险理论的双信号协同入侵检测模型。
An intrusion detection method based on rough set is proposed in order to overcome poor generalizing ability of current intrusion detection system in the case of less prior knowledge.
为了克服入侵检测系统存在着在先验知识较少情况的推广能力差的问题,提出了基于粗糙集理论的入侵检测方法。
We also design and realize the modular which can converse the alert to uniform standard IDMEF form that make it integrate into distributed intrusion detection system conveniently.
重新设计实现了报警模块,将警报格式转换成标准的idmef格式,使其可以方便的集成到分布式入侵检测系统中。
应用推荐