• In order to solve the problems in existing IDS, the artificial immunology is introduced in our network-based IDS.

    为了解决传统入侵检测系统中的不足,人工免疫原理引入入侵检测系统。

    youdao

  • It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.

    基于网络基于主机入侵检测系统有机地结合在一起,提供集成化的检测报告响应功能。

    youdao

  • This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.

    提出基于数据挖掘网络入侵检测规则特征自动发现算法规则自动生成算法。

    youdao

  • Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.

    由于当前基于主机入侵检测系统局限性使得基于代理入侵检测技术显得日益重要

    youdao

  • It provides a better safeguard for network system by the multi-agent-based distributed intrusion detection system that combines host-based IDS with network-based IDS.

    基于代理的分布式入侵检测系统实现了基于主机基于网络检测的结合网络系统提供更好安全保护

    youdao

  • We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

    本文提出种基于CVE标准建立的入侵检测专家系统规则,该入侵检测专家系统是基于网络主机的混合结合体,提供集成化的检测、报告响应功能。

    youdao

  • In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.

    本文对基于数据挖掘入侵检测基本思想技术了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。

    youdao

  • The examples query the order details based on the input order IDs.

    这些示例将根据输入订单ID查询订单详细信息

    youdao

  • Files are protected based on user IDs and thus accessible only to the owner application, which has the same user ID.

    文件基于用户ID保护,因而所有者应用程序是可访问的(此应用程序具有相同的用户ID)。

    youdao

  • Work items are managed by the authorization manager, based on the lists of associated user IDs provided by the staff support service, using the respective staff resolution plug-in.

    工作授权管理员基于人员支持服务所提供关联用户ID列表使用各自的人员解析插件来管理

    youdao

  • An er domain consists of IDS servers that can replicate data between themselves based on user-defined criteria (this criteria is explained in later sections).

    一个er包含几个IDS服务器可以基于用户定义标准(将稍后介绍)在这些服务器之间复制数据

    youdao

  • The lookup stage caches the query result and performs the lookup operations on the cached order details based on the order IDs from the OrderID input link.

    查找工作台将缓存查询结果根据OrderID输入链接中的订单ID缓存的订单详细信息执行查找操作

    youdao

  • The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.

    ObjectAuthorityManager (oam)中定义授权策略可以基于用户ID组成员身份进行访问控制

    youdao

  • Part 1 of this series introduced the IDS OAT, a Web-based interface for administering IDS, supported on IDS 11.10 and later. OAT offers many advantages.

    系列第1部分介绍IDSOAT这是IDS 11.10更高版本上支持基于WebIDS管理界面

    youdao

  • Starting in Version 11.1, IDS contains cluster-based replication functionality.

    version 11.1开始IDS包含了基于集群复制功能。

    youdao

  • Engagements can be set-up to allow client based surveys with IBM hosting the tool and providing access ids.

    可以建立基于客户调查(engagement),由IBM托管CAT工具提供访问ID。

    youdao

  • For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.

    例如如果DB 2使用一个基于操作系统验证机制配置,则用户需要验证操作系统用户ID密码。

    youdao

  • With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.

    对于ssh 基于主机认证主机必须建立一个信任关系然后配置主机所有用户ID都将可以相同的用户ID任何其他已配置主机登录

    youdao

  • Data Web services (DWS) is the next generation solution to significantly ease the development, deployment, and management of Web services-based access to DB2 and IDS database servers.

    DataWebServices (DWS)下一代解决方案,对于基于Web服务DB2IDS数据库服务器访问,该解决方案可显著简化开发部署管理

    youdao

  • The caching capability is provided by defining caching policies and constructing cache-ids based on the following.

    高速缓存能力根据下列因素定义高速缓存策略构造cache - id提供的。

    youdao

  • A PHP-based Web browser administration tool, OAT for IDS provides the ability to administer multiple database server instances from a single location.

    基于PHP的Web浏览器管理工具能够单一位置管理多个数据库服务器实例

    youdao

  • IDS 11 provides a sound solution to these situation in Label-Based Access Control.

    IDS11通过基于标签的访问控制(Label -Based Access Control)这些情况提供良好的解决方案

    youdao

  • With the Open Admin Tool, a PHP-based open source tool, and administrative SQL APIs, administration of IDS is minimal.

    由于使用OpenAdminTool(这是一个基于PHP开放源码工具SQLAPI 进行管理IDS管理非常简便。

    youdao

  • For example, using the sample data in Figure 1, the following index idx1 would be useful for look-ups and joins based on author IDs across all documents in the XML column bookinfo of the table books.

    例如使用1中的示例数据,可以根据author id使用下面索引idx 1books的xmlbookinfo中的所有文档进行查找连接

    youdao

  • IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.

    基于数据挖掘入侵检测系统具有一定自学习性完善性,可以检测已知或未知入侵行为

    youdao

  • Based on this thought, we propose an IDS alert correlation model based on description logics.

    思想基础上,进一步提出基于描述逻辑IDS告警关联模型

    youdao

  • In this paper, a detection-oriented attack classification method, based on data that IDS can collect directly, is proposed.

    该文提出一种ids直接收集数据为基础、面向检测的攻击分类方法

    youdao

  • This thesis constructs an IDS based on RBF neural network, which gives the basic thinking of design and the arithmetic, the method of collection and beforehand disposal way of the sample data.

    本文主要构建了一种基于RBF神经网络入侵检测系统给出基本设计思想算法,以及样本数据的收集预处理方法

    youdao

  • It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.

    通过仅仅考虑基于攻击知识特权事件来缩短建模时间并提高性能,从而使系统更加高效

    youdao

  • It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.

    通过仅仅考虑基于攻击知识特权事件来缩短建模时间并提高性能,从而使系统更加高效

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定