However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.
但是这种基于识别主机完整性信息的网络用户行为管理技术,不能识别出具有避绕主机完整性检查的攻击行为。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
The user would only experience "normal" behavior if the targeted external site handled its own state management using normal Web techniques such as session cookies.
只有目标外部站点使用会话Cookie等普通Web技术来处理自己的状态管理时,用户才会看到“通常”的行为。
This paper presents a model of campus network user behavior hazard assessment based on the LEC method, and introduces its practical application on network management system.
本文提出一个基于LEC方法的园区网用户行为危害评价模型,并介绍它在网络管理系统中的实际应用。
The others are :user's behavior analysis, user's personal resource management, information intelligent collection and user management.
另外几个子系统是:用户行为分析,用户个人资源管理、智能化信息采集、用户管理。
The others are :user's behavior analysis, user's personal resource management, information intelligent collection and user management.
另外几个子系统是:用户行为分析,用户个人资源管理、智能化信息采集、用户管理。
应用推荐