• 系统中,既综合了基于异常行为入侵检测基于特征入侵检测技术,在配置采用主机配置和网络配置相互配合的方式。

    In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

    youdao

  • 系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    youdao

  • 入侵检测技术原理分为异常检测误用检测检测内容分为主机入侵检测网络入侵检测技术。

    On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定