In order to solve the problems in existing IDS, the artificial immunology is introduced in our network-based IDS.
为了解决传统入侵检测系统中的不足,将人工免疫原理引入入侵检测系统。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.
提出了基于数据挖掘的网络入侵检测规则特征值自动发现算法和规则自动生成算法。
Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.
由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
It provides a better safeguard for network system by the multi-agent-based distributed intrusion detection system that combines host-based IDS with network-based IDS.
基于代理的分布式入侵检测系统实现了基于主机和基于网络检测的结合,为网络系统提供更好的安全保护。
We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.
本文提出一种基于CVE标准建立的入侵检测专家系统规则库,该入侵检测专家系统是基于网络和主机的混合结合体,提供集成化的检测、报告和响应功能。
In this paper, the basic ideas and techniques of data mining-based intrusion detection and an instance of data mining-based IDS are discussed, some problems and the future directions are proposed.
本文对基于数据挖掘的入侵检测的基本思想和技术等作了讨论,介绍了一个基于数据挖掘的入侵检测实例,提出了今后入侵检测的研究方向。
The examples query the order details based on the input order IDs.
这些示例将根据输入订单ID查询订单详细信息。
Files are protected based on user IDs and thus accessible only to the owner application, which has the same user ID.
文件基于用户ID受保护,因而只对所有者应用程序是可访问的(此应用程序具有相同的用户ID)。
Work items are managed by the authorization manager, based on the lists of associated user IDs provided by the staff support service, using the respective staff resolution plug-in.
工作项由授权管理员基于由人员支持服务所提供的关联用户ID列表并使用各自的人员解析插件来管理。
An er domain consists of IDS servers that can replicate data between themselves based on user-defined criteria (this criteria is explained in later sections).
一个er域包含几个IDS服务器,可以基于用户定义的标准(将在稍后介绍)在这些服务器之间复制数据。
The lookup stage caches the query result and performs the lookup operations on the cached order details based on the order IDs from the OrderID input link.
查找工作台将缓存查询结果并根据OrderID输入链接中的订单ID对缓存的订单详细信息执行查找操作。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Part 1 of this series introduced the IDS OAT, a Web-based interface for administering IDS, supported on IDS 11.10 and later. OAT offers many advantages.
本系列的第1部分介绍了IDSOAT,这是在IDS 11.10和更高版本上支持的基于Web的IDS管理界面。
Starting in Version 11.1, IDS contains cluster-based replication functionality.
从version 11.1开始,IDS包含了基于集群的复制功能。
Engagements can be set-up to allow client based surveys with IBM hosting the tool and providing access ids.
可以建立基于客户的调查(engagement),由IBM托管CAT工具并提供访问ID。
For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.
例如,如果DB 2使用一个基于操作系统的验证机制配置,则用户需要验证操作系统用户ID和密码。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
Data Web services (DWS) is the next generation solution to significantly ease the development, deployment, and management of Web services-based access to DB2 and IDS database servers.
DataWebServices (DWS)是下一代解决方案,对于基于Web服务的DB2和IDS数据库服务器访问,该解决方案可显著简化其开发、部署和管理。
The caching capability is provided by defining caching policies and constructing cache-ids based on the following.
高速缓存的能力是根据下列因素定义高速缓存策略和构造cache - id来提供的。
A PHP-based Web browser administration tool, OAT for IDS provides the ability to administer multiple database server instances from a single location.
它是基于PHP的Web浏览器管理工具,能够从单一位置管理多个数据库服务器实例。
IDS 11 provides a sound solution to these situation in Label-Based Access Control.
IDS11通过基于标签的访问控制(Label -Based Access Control)为这些情况提供了良好的解决方案。
With the Open Admin Tool, a PHP-based open source tool, and administrative SQL APIs, administration of IDS is minimal.
由于使用OpenAdminTool(这是一个基于PHP的开放源码工具)和SQLAPI 进行管理,IDS 的管理非常简便。
For example, using the sample data in Figure 1, the following index idx1 would be useful for look-ups and joins based on author IDs across all documents in the XML column bookinfo of the table books.
例如,使用图1中的示例数据,可以根据author id使用下面的索引idx 1对表books的xml列bookinfo中的所有文档进行查找和连接。
IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.
基于数据挖掘的入侵检测系统具有一定的自学习性和自完善性,可以检测已知或未知的入侵行为。
Based on this thought, we propose an IDS alert correlation model based on description logics.
在此思想基础上,进一步提出了基于描述逻辑的IDS告警关联模型。
In this paper, a detection-oriented attack classification method, based on data that IDS can collect directly, is proposed.
该文提出一种以ids可直接收集的数据为基础、面向检测的攻击分类方法。
This thesis constructs an IDS based on RBF neural network, which gives the basic thinking of design and the arithmetic, the method of collection and beforehand disposal way of the sample data.
本文主要构建了一种基于RBF神经网络的入侵检测系统,给出了基本的设计思想和算法,以及样本数据的收集和预处理方法。
It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.
通过仅仅考虑基于攻击域知识的特权流事件来缩短建模时间并提高性能,从而使系统更加高效。
It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.
通过仅仅考虑基于攻击域知识的特权流事件来缩短建模时间并提高性能,从而使系统更加高效。
应用推荐