对网络入侵行为的响应策略不完善。
It isn't perfects in the response policy of the network attacks.
入侵检测系统是用来检测网络入侵行为的工具。
IDS (intrusion Detection System) is a tool to detect the network intrusion actions.
随着互联网络的飞速发展,网络入侵行为日益严重。
With the internet fast developping, net inbreak action have been serious increasingly.
通过检测这种光的变化量可以探测外界的入侵行为。
By detecting the changes, the outside intrusion can be detected.
该系统架构能主动发现和阻止入侵者,抑制入侵行为。
This framework can actively discover and prevent intruders and restrain intrusion action.
对用户的非正常活动进行统计分析,发现入侵行为的规律。
Normal activities of the user's non-statistical analysis and found that intrusion of the law.
现有的入侵检测方法难以有效地检测这种分布式的入侵行为。
It is difficult to detect effectively these distributed attacks by the current intrusion detection approaches.
该方法能有效的检测到外部用户及内部用户对系统的入侵行为。
The method can effectively detect the act of intruding system from the inside user and outer user.
通过与其它的安全产品的联动还可以实现对入侵行为的有效阻止。
It also can stop intrusion activities with the linkage of other security technology.
另外它还可以用来提取一些未知的或未被发现的入侵行为模式等。
It can also be used to pick up some unknown or undetected intrusion modes.
入侵检测技术可以在网络系统受到损害前对入侵行为做出拦截和响应。
Intrusion detection is a technology that can detect intrusion and make response before network system will get harm.
为了发现潜在的入侵行为,扩展了IDMEF格式,提出了怀疑度概念。
To find latent intrusion, the intrusion detection message exchange format(IDMEF) was extended with a concept of suspicion level proposed.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively.
入侵检测是一种通过某种方法完成网络系统中入侵行为检测和报告的技术。
Intrusions detection is a technology through the completion of the network system intrusions detection and reporting.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
网络入侵诱控是一种可以检测分析并对入侵行为做出主动控制的安全新技术。
Intrusion deception and control technology is a new security technology which can detect, analyze and even control the intrusion actively.
俄罗斯在对其入侵行为进行辩解的时候表现的非常敷衍,宣称此举是为了保护俄罗斯公民。
Russia has made perfunctory attempts to justify the invasion. It claimed that it was defending Russian citizens.
如果一个实际的入侵检测系统不对数据进行处理,则无法准确地检测到入侵行为。
If an actual ID cannot process data, so the intrusion detection behavior cannot be detected by the detection system accrual.
随着互联网的飞速发展,网络入侵行为日益严重,网络安全日益成为人们关注的焦点。
With the quick development of the Internet, network intrusion behavior becomes more and more serious; network security becomes the focus which people pay attention to.
操作系统的类型信息对于研究针对计算机网络的入侵行为和安全防护措施是非常重要的。
Information of OS types is very important to the research on intrusion behaviors against computer networks.
它通常根据系统的正常数据流背景来检测入侵行为,故而也有人称其为“启发式特征检测”。
It usually measures the behavior of invading according to the normal dataflow background of the system, so is called "the heuristic characteristic measures".
该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。
Combined with Q - learning, action tracing and intrusion forecasting, this model is applied to detect and response to the unknown intrusion.
实验表明该算法针对不同特征属性的数据集,检测不同类型的入侵行为,具有很好的检测结果。
The experimental results indicate that the algorithm is very successful in picking different types of attacks in data set based on different attribute features.
基于数据挖掘的入侵检测系统具有一定的自学习性和自完善性,可以检测已知或未知的入侵行为。
IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.
大部分的入侵行为都会引起被入侵主机的存储变动,因此检查存储变动是一种有效的入侵检测方法。
Most intrusion behaviors could cause storage modification of intruded hosts, so checking storage modification is an effective intrusion detection method.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
二是在数据包与入侵规则进行模式匹配时,使用什么样的模式匹配算法来快速准确地检测出入侵行为。
The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.
二是在数据包与入侵规则进行模式匹配时,使用什么样的模式匹配算法来快速准确地检测出入侵行为。
The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.
应用推荐