Then, in the light of well-established theory of DoS attack, it is suggested to employ IDS to defend, including anomaly detection,arbitrary detection, and data mining.

 
  • 在本文中,作者重点将建立一个抗DOS攻击的模型,该模型利用数据挖掘(DM)原理,采用关联规则算法、序列模式算法和BP网络算法作为判断攻击的主要理论依据。
今日热词
目录 附录 查词历史