You know that Snort is an intrusion detection system, but how does it detect intrusion?
您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
They are formed from groundwater saturated in calcium sulphate which, warmed by an intrusion of magma about a mile below, began filtering through the cave system millions of years ago.
其因为地下水渗透到硫酸钙中,又被几百万年前渗透到洞穴系统的将近一米深的岩浆温暖所形成的。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
System-wide startup files aren't intended as an intrusion, but rather facilitate the use of resources specific to that system.
系统范围启动文件的目的不是干扰您的工作环境,而是简化系统特定资源的使用。
This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.
这款冷战时期的侵入侦测系统旨在与周围环境融为一体,它能够探测300米之外的任何活动物体。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
Alarm systems - Intrusion and hold-up systems - Part 1: system requirements.
警报系统。侵入和保持报警系统。第1部分:系统要求。
Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.
入侵检测系统是保护网络系统安全的关键技术和重要手段,是网络安全领域的研究热点。
Host intrusion detection system (HIDS) is very important in the field of protecting the host.
主机入侵检测系统在保护主机方面起着非常重要的作用。
The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.
生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义。
This paper introduces the design of balloting in intrusion tolerant database system.
文章介绍入侵容忍数据库系统中选举方案的设计与实现。
Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.
入侵检测技术可以在网络系统受到损害前对入侵行为做出拦截和响应。
Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.
在探讨免疫学基本原理的基础上,提出了基于免疫学的多代理系统,用于联网计算机的入侵检测与反应。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
入侵检测系统是用来检测网络入侵行为的工具。
It combine various intrusion detection technology into a system, and provide detection, report and respond together.
他将多种入侵检测技术有机地结合在一起,能够提供集成化的检测、报告和响应功能。
In the design of the network intrusion system, the design of the intrusion detection engine is the key link.
网络入侵检测系统的设计中,入侵检测引擎的设计是关键。
Intrusion detection system monitoring is essential 24 hours a day; this capability can be easily set up through a pager.
入侵检测系统的监测是必不可少的,每天24小时,这功能可以轻易通过寻呼机了。
Intrusion detection system (IDS) is the key component of the architecture of information security.
入侵检测系统(IDS)是信息安全体系结构的重要组成部分。
Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.
实验表明,该系统对已知攻击模式具有很高的检测率,对未知攻击模式也具有一定的检测能力。
Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
The model of Multiple Neural Networks by Fuzzy(MNNF) integral presented in this paper is an effective method to improve the detection performance of network intrusion detection system.
为了进一步提高网络入侵检测系统的检测性能,将模糊积分理论和神经网络技术应用到网络入侵检测中,提出了基于模糊积分的多神经网络融合模型MNNF。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
Interaction is a new-fashioned network defense strategy, interaction model is footstone of intrusion protection system.
联动是一种新型的网络防护策略,联动模型是入侵防御体系的基石。
In this paper, a data mining-based network intrusion detection system model is introduced.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
In this paper, a data mining-based network intrusion detection system model is introduced.
本文提出了一种基于数据挖掘的网络入侵检测系统模型。
应用推荐