• 另外可以用来提取一些未知未被发现入侵行为模式

    It can also be used to pick up some unknown or undetected intrusion modes.

    youdao

  • 文章介绍了我们设计开发的分布式协同入侵检测系统(DACIDS)中通过对入侵行为模式的匹配而进行告警关联的方法。

    In this paper, we propose to use intrusion action pattern to correlate alerts in our Distributed Active Collaboration intrusion Detection System (DACIDS).

    youdao

  • 人们同样不会入侵别人隐私以及保护已经过时频临崩溃商业模式进行严厉法律保护的行为进行辩解

    But there isn't a moral defense for invading people's privacy and imposing draconian laws to protect outdated, crumbling business models either.

    youdao

  • 测试结果表明IIDS可以有效地检测网络入侵行为以及未知攻击模式,达到预期目标

    The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.

    youdao

  • 提出了一种基于系统调用序列入侵检测模型,利用绝对安全环境下的应用程序系统调用序列建立正常行为模式

    In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.

    youdao

  • 描述属性建立模糊轮廓行为属性建立行为模式基于模糊轮廓树实现入侵检测的方法。

    We build a fuzzy profile tree based on describing attributes and behavior patterns based on acting attribute, and finally detect invasions based on the fuzzy profile tree.

    youdao

  • 如果一个实际入侵行为稍有偏差就可能正常模式匹配,而异常检测系统无法检测到这种入侵行为

    In addition, an actual intrusion with a small deviation may match normal patterns. So the intrusion behavior cannot be detected by the detection system.

    youdao

  • 并且检测未知入侵行为方面,构建一个预想模型未知入侵行为做了预警一定程度改善模式匹配技术本身弱点

    Besides, it builds up a designed model to alarm at unknown intrusion detection, which to some extends, improves the disadvantage of module matching technology.

    youdao

  • 有计划分析异常行为模式然后IDS建立条正常使用模式基准线,那么任何行为只要背离的这个基准当作可能入侵来看待

    Designed to uncover abnormal patterns of behavior, the IDS establishes a baseline of normal usage patterns, and anything that widely deviates from it gets flagged as a possible intrusion.

    youdao

  • 数据包入侵规则进行模式匹配时,使用什么样的模式匹配算法快速准确地检测出入侵行为

    The other is which pattern match algorithm can be used to detect intrusion quickly and accurately when the packet matching intrusion rules.

    youdao

  • 基于程序行为异常检测方法主要通过建立程序正常行为模式检测入侵

    It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.

    youdao

  • 通过比较当前系统行为模式已有模式规则的相似度发现已知或者未知误用入侵异常入侵活动。

    Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions.

    youdao

  • 通过比较当前系统行为模式已有模式规则的相似度发现已知或者未知误用入侵异常入侵活动。

    Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定