日誌分析器 的英文怎麼說
中文拼音 [rìzhìfēnxīqì]
日誌分析器
英文
log analyzer- 日 : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
- 分 : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
- 析 : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
- 器 : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
- 日誌 : daily record; journal
-
Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated
首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。The value of the program counter when the logging guard clause is discovered in the analyzed code
:在所分析的代碼中發現日誌監護子句時,程序計數器的值Web log mining is applying web mining in analysis of web server log in order to solve problems mentioned above
Web日誌挖掘就是運用數據挖掘的思想來對服務器日誌進行分析處理,從而解決上面提出的各種問題。The web log analyzer sample is a windows form application that analyzes log files created by web servers, such as microsoft internet information server. it includes reports that show statistics on page hits, server activity, and referrals from other sites
Web日誌分析器示例是一個windows窗體應用程序,用於分析web服務器[如microsoft internet information server ( iis ) ]創建的日誌文件,包含顯示有關頁點擊次數、服務器活動和其他網站推薦的統計信息的報表。Principle and implementation in analyzing mail server ' s log file
郵件服務器日誌分析的原理與實現Finally, the essay presents analysis and research on the function demand of the safety audit, other audit techniques as well as the security log analysis principle
最後,本文對安全審計的功能需求和各種審計技術及日誌分析原理進行了分析研究,給出了郵件服務器日誌分析的具體實現過程和方法。This can be another reason why process choreographer performance degrades if you run audit log analysis in parallel with process navigation. to reduce impact on regular process navigation, make sure you store the
這也可能是在您使用流程引導操作時同時運行審核日誌分析,此時流程編排器性能為什麼會下降的原因之一。In the paper, we apply the approach of data mining to log analysis system of ids, and especially solve the problem of intrusion model ' s drawing and classifier ' s constructing in the system, which also does solve the automatic process of log analyses
將數據挖掘的方法應用於ids日誌分析系統,並構造出了入侵模式提取與檢測分類器建立的處理流程,從而解決了日誌分析自動化的問題。Sample : web log analyzer for reportviewer
示例: reportviewer的網站日誌分析器In web log analyzer, select open log files from the
在web日誌分析器中,從「文件」菜單中選擇「打開日誌文件」 。Ims problem investigator makes ims log analysis quicker and easier than ever before
Ims問題檢測器使得ims日誌分析器比以前更快而且更容易。Web log analyzer includes functionality that allows you to configure the files that are included in the analysis
Web日誌分析器具有允許配置分析中包含文件的功能。In accordance with practical network environment, we design and implement fault management system fms based on snmp. using client / server architecture, our system established a distributed management model which is compose of console / manager / agent, finished network status monitoring, event processing, fault alarm and log, collecting and analysing mib variable, etc., provided many utilities about detection and browsing
系統採用了客戶服務器結構,建立了由控制臺管理者代理構成的分散式管理模型,完成了狀態監視、事件處理、故障報警和日誌、 mib變量的獲取和分析等多項功能,提供了關于檢測和瀏覽的有關工具。This thesis introduces the background about this system and solving path at first ; then emphasises to describe ideas and implementation of clustering - algorithm ; furthermore expands on the characteristics and flows of each module ; analyses how to establish security policies ; finally summary full text, and suggest further works, otherwise, it also make point of personalizing hyperlinks and personalizing search - engines based on web data mining, making personalizing application more integrate
本文首先介紹了論文所提問題的背景和解決途徑;然後說明了本系統的概念定義和目標;重點介紹了系統中聚類演算法的思想和實現;進而詳細闡述了系統各個功能模塊的特徵和流程;分析了如何通過服務器日誌建立安全策略;最後進行了總結,並提出了下一步的工作。此外,論文提出了個性化引擎、個性化鏈接與web數據挖掘的結合,使個性化應用更加全面。This paper not only establish the remote analysis and audit of the checkpoint netscreen, iptables firewall log, but also establish the remote log audit servicer. it is of much benefit to manager and add the safety of the firewall
本文建立了checkpoint 、 netscreen 、 iptables等防火墻日誌的遠程分析和審計,在遠程建立了日誌審計服務器。這樣既有利於管理人員又可以增強防火墻的安全性。Based on web log of hannan univercity, this paper focused on the following aspects : 1 ) aanalyze and reserch technology of web log mining ; 2 ) bring forward a multi - path partitioning cluster method, which partions and clusteres according to user access path to improve effiency ; 3 ) bring forward a hierarchy search and iterative method to find frequent set
本文結合海南大學web服務器日誌,主要研究了以下內容: 1 ) web服務器日誌挖掘技術進行了系統的分析和研究。 2 )提出了多路徑分割聚類方法。這種方法根據用戶的訪問路徑進行分割聚類,有效地提高了聚類演算法的效率。The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the
正文開始從防火墻的技術背景入手,先介紹了網路處理器的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了防火墻的整個硬體結構和軟體結構,以及開發環境;然後介紹了網路安全的概念和防火墻技術,並對ipv6協議特點作了較為詳細的分析;接著按著防火墻設計的步步深入,先提出了ipv6防火墻的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上層vpn 、包過濾核心、應用代理、配置管理、 url過濾、日誌六個控制平面子模塊的功能和實現,並提及系統實現中使用的數據庫。分享友人