• You know that Snort is an intrusion detection system, but how does it detect intrusion?

    知道Snort一种入侵检测系统如何检测入侵的呢?

    youdao

  • The first tools for meeting these requirements are system auditing and host-based intrusion detection.

    满足这些需求第一工具系统审计基于主机入侵检测

    youdao

  • They are formed from groundwater saturated in calcium sulphate which, warmed by an intrusion of magma about a mile below, began filtering through the cave system millions of years ago.

    因为地下水渗透硫酸钙中,又被几百万年前渗透洞穴系统将近一米深岩浆温暖形成的。

    youdao

  • Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.

    还有一个办法调整IDS(入侵检测系统)IPS(入侵防御系统)查找有僵尸嫌疑的行为。

    youdao

  • Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.

    可以证明,Snort市面上最好易用或许也是最便宜的入侵检测系统。

    youdao

  • System-wide startup files aren't intended as an intrusion, but rather facilitate the use of resources specific to that system.

    系统范围启动文件目的不是干扰您的工作环境,而是简化系统特定资源使用

    youdao

  • This Cold War-Era intrusion-detection system was designed to blend in with the terrain and could detect movement of people, animals or objects up to 300 meters away.

    冷战时期侵入侦测系统旨在周围环境融为一体,它能够探测300之外的任何活动物体

    youdao

  • In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式

    youdao

  • Alarm systems - Intrusion and hold-up systems - Part 1: system requirements.

    警报系统侵入保持报警系统。第1部分:系统要求

    youdao

  • Intrusion detection system is the key technologies to protect network systems security and is important way of network security, being a hot area of research and development.

    入侵检测系统保护网络系统安全关键技术重要手段,是网络安全领域研究热点

    youdao

  • Host intrusion detection system (HIDS) is very important in the field of protecting the host.

    主机入侵检测系统保护主机方面起着非常重要作用。

    youdao

  • The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.

    生物免疫系统自我保护机制设计新的网络入侵检测系统具有很好的借鉴意义。

    youdao

  • This paper introduces the design of balloting in intrusion tolerant database system.

    文章介绍入侵容忍数据库系统选举方案设计与实现。

    youdao

  • Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.

    入侵检测技术可以网络系统受到损害对入侵行为做出拦截响应

    youdao

  • Based on investigating immunological principles, the paper presents a multi agent system for intrusion detection and response in networked computers.

    探讨免疫学基本原理基础提出了基于免疫学的代理系统用于联网计算机的入侵检测反应

    youdao

  • According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.

    计算机病毒入侵系统途径将计算机病毒分为源码病毒、入侵病毒、操作系统病毒外壳病毒。

    youdao

  • For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.

    为了加强安全可以考虑所有机器上安装配置入侵检测系统(IDS),例如Snort

    youdao

  • IDS (intrusion Detection System) is a tool to detect the network intrusion actions.

    入侵检测系统用来检测网络入侵行为的工具

    youdao

  • It combine various intrusion detection technology into a system, and provide detection, report and respond together.

    多种入侵检测技术有机地结合在一起能够提供集成化的检测、报告响应功能

    youdao

  • In the design of the network intrusion system, the design of the intrusion detection engine is the key link.

    网络入侵检测系统设计,入侵检测引擎的设计关键

    youdao

  • Intrusion detection system monitoring is essential 24 hours a day; this capability can be easily set up through a pager.

    入侵检测系统监测必不可少的每天24小时功能可以轻易通过寻呼机了

    youdao

  • Intrusion detection system (IDS) is the key component of the architecture of information security.

    入侵检测系统(IDS)信息安全体系结构重要组成部分

    youdao

  • Experiment shows that the system model can detect known intrusion modes with very high detection rate, and also can detect some unknown intrusion modes.

    实验表明系统已知攻击模式具有很高检测对未知攻击模式具有一定检测能力。

    youdao

  • Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.

    入侵检测通过收集各种网络数据,从中分析发现可能的入侵攻击行为

    youdao

  • The model of Multiple Neural Networks by Fuzzy(MNNF) integral presented in this paper is an effective method to improve the detection performance of network intrusion detection system.

    为了进一步提高网络入侵检测系统检测性能,将模糊积分理论和神经网络技术应用网络入侵检测提出了基于模糊积分的神经网络融合模型MNNF

    youdao

  • Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.

    第三章介绍网络协议基础常见攻击方法原理入侵检测系统规范标准

    youdao

  • Interaction is a new-fashioned network defense strategy, interaction model is footstone of intrusion protection system.

    联动一种新型网络防护策略,联动模型入侵防御体系基石

    youdao

  • In this paper, a data mining-based network intrusion detection system model is introduced.

    本文提出了一种基于数据挖掘网络入侵检测系统模型

    youdao

  • In this paper, a data mining-based network intrusion detection system model is introduced.

    本文提出了一种基于数据挖掘网络入侵检测系统模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定