将审计数据装载到表中有很多好处。
首先必须创建容纳审计数据的表。
使用db2表中的审计数据。
电子数据;联网审计;审计数据接口;数据仓库。
Electronic data Processing; Online auditing; audit data interface; data Warehouse.
比如,假设尝试的所有股票交易都必须被记录在一个审计数据库中。
For example, suppose that every stock trade that was attempted had to be recorded in an audit database.
入侵检测系统可以从日志审计数据中提取安全模式规则。
So IDS can extract security mode rules from the log audit data.
该模型针对安全审计数据,融合了一个备份恢复和数据挖掘模块。
The model integrates one backup-restore and data mining module for the data of security audit.
本文通过对审计数据进行关联规则分析,发现潜在的攻击系统行为。
This paper focuses on discovering the potential attack behaviors by analyzing association rules in audit data.
通过添加一些额外的代码到DAO就可以写下相关的细节到审计数据库内。
By adding extra code into the DAO to write all relevant details out to the AUDIT database.
通过密切观测地球的“呼吸”机理,新发射的卫星将如同会计师一样,定期向地面返回审计数据。
The new satellites will work as carbon accountants by keeping a close eye on how the Earth breathes and returning regular audits.
使用 REQUIRES_NEW属性可以确保不管初始事务的结果如何,审计数据都会被保存。
Using the REQUIRES_NEW attribute guarantees that the audit data is saved regardless of the initial transaction's outcome.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
In network system there is a large amount of log audit data which contain much information related to security.
但由于这些日志审计数据量非常庞大,因此采用数据挖掘技术从中进行安全模式规则的提取。
However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.
以前专门用来维护定制解决方案和检查审计数据的资源现在可以重新分配,用这些资源支持组织的战略性计划。
Resources previously dedicated to the maintenance of custom solutions and the review of audit data can be redeployed to support the organization's strategic initiatives.
审计缓冲区大小(audit _ buf_sz):该参数指定审计数据库时使用的缓冲区的大小。
Audit buffer size (audit_buf_sz) : This parameter specifies the size of the buffer used when auditing the database.
当然,构建管理工具需要能够聚集并组织从任何您拥有的开发工具那里来的审计数据,即使这些工具是来自不同的厂商。
Of course, the build management tool needs to be able to aggregate and organize audit data from whatever development tools you have, even if they come from different vendors.
另外,我们对IDMEF进行了扩展,以支持系统中审计数据上报、规则发布、响应指令、协作分析等要求。
So we extend the IDMEF to support audit data report, detection rules distribution, response instruction, and cooperative analysis in the system.
文章对多种数据质量问题进行了详细分析和分类,提出了提高审计数据质量的一般处理方法和可实现的技术。
This paper classifies the data quality problems and analyses such problems in detail, and finally puts forward some general methods and techniques to improve the data quality.
其思想是通过将网络审计数据转化为时序数据库,对其进行序列模式挖掘以提炼出用户行为模式,并由此进行异常检测。
The idea is to transform the net audit data into time series database and mine the sequence pattern to extract the user behavior pattern , and then to use behavior pattern in anomaly detection.
讨论了用数据挖掘中的关联规则对IDS审计数据进行分析,给出了一种改进的OPUS算法,并对实验结果进行分析。
This paper discusses how to make use of association rules in IDS audit data analysis. With an improved OPUS algorithm, some tests are done.
此调用包括源安全标识符(sid)、安全类(根据请求操作的详细信息构造)、特定socket调用,以及可选的辅助审计数据。
This call includes the source security identifier (sid), the security class (constructed from the details of the requested operation), the particular socket call, and optional auxiliary audit data.
这种方法的主要思想是利用数据挖掘方法,从经预处理的包含网络连接信息的审计数据中提取能够区分正常和入侵的规则。
The main idea is to apply data mining methods to learn rules that can capture normal and intrusion activities from pre-processed audit data that contain network connection information.
例如,如果只需要审计数据库连接和系统管理事件类型,那么在配置审计功能时应该仅指定VALIDATE和SYSADMIN事件类型。
For example, if you only needed to audit database connection and system administration event types, you would only specify the VALIDATE and SYSADMIN event types when configuring the facility.
为了让之前创建的db2表保存审计数据,使用以下命令将从checking. del文件中提取的数据装载到checking表中。
Having previously created the DB2 tables to hold the audit data, you load the extracted data from the checking.del file into the checking table, using the following command.
利用数据挖掘技术对审计数据加以分析,总结出一些正常模式,用来进行异常检测,将有助于提高入侵检测系统的检测准确性和完备性。
Use data mining methods to analyze the audit data and provide anomaly detection based on the generated normal patterns, this method can improve the performance of intrusion detection system.
c8AuditExtension应用程序可使用一个已有的IBMCognos8审计数据库或一个为此应用程序特别创建的单独的数据库。
The c8AuditExtension application can use either an existing IBM Cognos 8 audit database or a separate database created specifically for this application.
c8AuditExtension应用程序可使用一个已有的IBMCognos8审计数据库或一个为此应用程序特别创建的单独的数据库。
The c8AuditExtension application can use either an existing IBM Cognos 8 audit database or a separate database created specifically for this application.
应用推荐