Snort规则分析与规则增加 计算机毕业论文格式范文_论文天下网 关键词:攻击特征,入侵检测,规则 [gap=1757]Key Words:Attack Signature, Intrusion detection, Rule
基于78个网页-相关网页
一、背景 ... ∣描述 Description 攻击特征 ttp : Attack_Pattern ∣描述 Description ...
基于2个网页-相关网页
The Expert Knowledge Database of Attack Signature Pattern is just the core of Signature-based Pattern-matching Intrusion Detection System.
攻击特征模式专家知识库是基于攻击特征模式匹配入侵检测系统的核心。
参考来源 - 基于模式匹配的入侵检测系统Construct the feature database about the attack affairs, Combing the obtained attack features;4. Implement the invasion detection which combines the network detecting collections and the obtained results, and supports the IPv4 and IPv6 protocol at the same time.
本文研究的主要成果有:①构造了IPv6环境并开发出了基于IPv6的攻击集成平台;②对整个的IPv6环境下的攻击进行尽可能全面地模拟;③结合已有研究的攻击特征,构建起了漏洞攻击事件特征库;④实现了网络探测收集和自身研究相结合,同时支持IPv4/IPv6协议的入侵检测。
参考来源 - IPv6关键技术及其网络安全研究In terms of the concurrence of the network intrusion and the uncertainty of attack character extraction, fuzzy Petri nets to express attack knowledge and construct reasoning model are given.
根据网络攻击具有并发性,攻击特征的提取具有不确定性等特点,给出了采用模糊Petri网实现攻击知识的表达和入侵检测的推理模型。
参考来源 - 模糊Petri网知识表示方法在入侵检测中的应用 in C·2,447,543篇论文数据,部分数据来源于NoteExpress
基于攻击特征的检测具有准确性高的优点;
The way of attack signature detection has advantage of high accuracy.
保护,防止他们实现其目标,从已知的攻击特征的网络。
Protects the network from known attack signatures by preventing them from reaching their targets.
本文讨论了网络安全研究的紧迫性,黑客攻击特征,安全漏洞问题。
This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.
应用推荐