您要查找的是不是:
- intrusion detective rules 入侵检测规则
- the whole process of network data collection, data pretreatment, conformation of training data volume, data filtration and creating intrusion detection rules by using data mining are designed. 探讨了从网络数据采集、数据预处理、构造训练数据集、数据过滤,到利用数据挖掘技术生成入侵检测规则的整个过程的机理和实现方法。
- Certificate Authority and Intrusion Detection. 北京教育考试院网络中的认证机制和入侵检测。
- Intrusion detection system is called the second strobe of security. 入侵检测系统是防火墙之后的第二道安全闸门。
- Thus,they are used in intrusion detection,it will generate multiple insignificant rules and even they are misguided. 因此,将其应用于入侵检测时,很可能挖掘出大量无用规则,甚至是误导的规则。
- Classify the datagram on LANs can provide some evidences of NID(network intrusion detect). 对数据报行为进行分类可为局域网上的网络入侵检测提供重要依据。
- Director of Research for Intrusion Detection and Response? 关于入侵检测与响应和安全方面有什么书籍?
- Statistical abnormality examining and examining based on rule are generally accepted in intrusion detection module. 采用反常检测统计和基于规则的检测技术进行入侵检测。
- Management objects related to intrusion detection in management information base(MIB) were analyzed to form rules from different network levels. 从网络的各个层次分析管理信息库中与入侵检测有关的管理对象,建立检测规则库。
- Faced with the significant limitations of association rules method based axis attribute, a intrusion detection method based aggregation emerging pattern is proposed in this paper. 分析了基于轴属性的关联规则方法的局限性,提出了基于聚集显露模式的入侵检测方法。
- The experimental results prove that the intrusion detection method based on Hebb rule can correctly build the network behavior model and detect abnormal behavior in local area network accurately. 实验证明该方法能够正确地构造网络行为模型,并能准确地检测出异常行为。
- Intrusion Detection is an important means to achieve database security. 入侵检测是保障数据库安全的重要手段。
- Consider security measures like Firewall and Intrusion Detection System. 要考虑采用防火墙及入侵侦测系统等保安措施。
- The most important sector in Misuse intrusion detection is pattern matching. 滥用入侵检测技术中最重要的一个环节是模式匹配,目前的模式匹配主要是对报文中特征字符串的匹配。
- Intrusion Detection(ID)is an important aspect in network security technology. 入侵检测是网络安全技术的一个重要方面。
- The origin and development of Intrusion Detection System(IDS) are reviewed. 回顾了入侵检测系统的起源及其发展过程。
- In firewall of most nowadays network, those who depend on is diagnostic library of the static state, with inbreak the system that monitor (IDS, intrusion Detect System) the principle is similar. 在如今大多数网络防火墙中,依靠的是静态的特征库,与入侵监测系统的原理类似。
- The research of this thesis is based on the wildly used open source antivirus software ClamAV. Most recent research of pattern matching hardware is targeted for Network Intrusion Detection System and Snort rules. 本文的研究基于广泛使用的开源防病毒软件ClamAV。 现有的模式匹配电路研究大多基于网络入侵检测和Snort规则库。
- Disables the Intrusion Detection System, leaving your computer open to network attacks. 禁用入侵检测系统,将您的计算机对网络攻击开放。
- This clustering algorithm can deal with network intrusion detection from mass unlabeled data, distinguish between normal and abnormal data and detect unknown attacks. 该算法可实现对大规模无标识原始数据的入侵检测,区分正常和异常行为,并能检测到未知攻击。