attack detection 中文意思是什麼

attack detection 解釋
入侵檢測
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  2. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    本文首先從數據來源、數據處理周期、數據收集和分析、入侵檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,分析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵數據分析的智能性、面臨新的入侵方法時的適應性和網路配置發生變化時的可擴展性等方面的不足和問題。
  3. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  4. The topic of the thesis is to research fast response system ( frs ). the research aims to construct the architecture of frs for detecting intrusion, tracing attack source, correlating alerts, evaluating the damage of attack, describing attack, and taking automatic response to attack. three related projects, cooperative intrusion traceback and response architecture ( citra ), automatic intrusion detection environment, and adaptive, agent - based, intrusion response system ( aairs ), are analyzed

    本文旨在對快速反應技術進行研究,建立針對網路攻擊的快速反應系統,該系統具有入侵檢測、攻擊源回溯功能;通過報警信息的關聯、攻擊破壞力的分析,以及攻擊的準確描述,完成對常見網路攻擊的準確定義;並且根據攻擊描述信息,自動對攻擊進行響應,達到有效地阻止攻擊的目的。
  5. Just as burglar alarms alert homeowners when someone has broken through a locked window or door, intrusion - detection systems alert system administrators when hackers have gotten past a firewall, making it possible to thwart the attack and even track down the intruder

    正像有人破窗或破門而入時防盜警報警告房屋主人那樣,當黑客突破防火墻時,入侵探測系統就警告系統管理員,使得有可能挫敗入侵,甚至也可能追捕入侵者。
  6. Attack group two will continue to objective using their shadow devices to avoid detection by invid sensors

    第二攻擊群將繼續使用他們的陰影裝備避免被invid探測器發現(接近)目標。
  7. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。
  8. In theory, disaster tolerance technology includes heartbeat detection technology and many other technical means, such as two module backup, computer cluster, storage area network, etc. in computer systems, when human operation failure occurs, system error occurs, or even physical attack, lack of power, flood and other disaster occur, disaster tolerance technology can prevent system from losing data, meanwhile, provide high availability service

    從范疇上講,容災技術包括心跳檢測技術在內的許多技術手段,如雙機熱備份,計算機集群,存儲區域網路等。在計算機系統發生人為失誤,系統錯誤,甚至受到外來打擊或者遭到停電,洪水等災難性的破壞時,容災技術仍能使系統在少損失數據甚至不損失數據的情況下對外提供高可用不間斷或間斷時間很短的服務。
  9. The elements of situation maps include the information of flight track, detection range of radar, capability of weapon attack, and quantification of being attacked etc

    態勢圖元素包括飛機的軌跡信息、雷達探測范圍信息、火力攻擊范圍信息,以及受威脅程度的定量描述等。
  10. The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles

    異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。
  11. With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security

    隨著網路攻擊手段的日益復雜化、多樣化和自動化,傳統的入侵檢測系統( ids )已不能滿足安全需求。
  12. Ids has been fast developing since it ' s put forward. but intrusion detection technology is now wandering with the universal application of high - speed network, the appear of new attack methods like distributed denial of service attack, and the low efficiency and high false positive of today ' s idss

    但是,由於高速網路和交換式網路的普遍應用,以分散式拒絕服務攻擊為代表的新型攻擊方式的出現和發展,以及現有入侵檢測系統效率低下、誤報率和漏報率較高的問題無法得到有效解決等問題,目前入侵檢測技術正處于發展的關鍵時期。
  13. The new model can resolve the unresolved problem such as the relation among the attack events, the model forecasting and the model preventing. we use petri net to model the new intrusion detection model, and we make the qualitative and quantitative analysis of reachability and complication degree, and then we use c + + builder 6. 0 to fulfill the model ' s reachability property and performance analysis

    本文對此時間序列模型用petrinet進行建模,對所建模型進行可達性、復雜度等性質的定性定量的分析,並且使用c + + builder6 . 0對模型的可達性性質進行了編碼實現和性能分析。
  14. Machine learning algorithm discussed in this paper is not the same of the traditional ones, the later needs training samples which include positive and negative ones however we only provide positive ones, i. e. no attack events, for intrusion detection machine learning algorithm during training phase

    文中所討論的在入侵檢測技術中應用的機器學習演算法,在訓練階段只有正例樣本,這是與其它機器學習演算法的不同之處。
  15. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  16. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是未標定的不均衡數據集的情況,把攻擊檢測問題視為一個孤立點發現或樣本密度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡數據集對于數目較少的那類樣本分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  17. Dm can automatically extract the signatures and features without human interference. it can be used in unknown attack detection and decrease the dependence of es on the detection rule

    而利用數據挖掘技術能夠自動提取模式的特點進行異常檢測,能夠自動發現未知模式的入侵,降低了專家系統對知識庫中規則的依賴性。
  18. Two new kinds of detection - filtering mechanism are proposed in this paper. they are distributed attack detection - filtering mechanism ( dadf ) and local attack detection - filtering mechanism ( ladf )

    在此基礎上,本文提出了兩種新的攻擊檢測?過濾機制,即:分散式攻擊檢測?過濾( dadf )機制和針對tcp洪流攻擊的本地檢測?過濾( ladf )機制。
  19. There seem to be no substantial improvement in anti - ddos research on attack preventing, detecting & retorting yet, nor did any effective or nicety method appear to predict the ddos attack in time. ddos attack detection and defending is one of the frontiers in the field of network security

    但是,目前全球對ddos攻擊進行防範、檢測和反擊的研究工作沒有實質性的重大突破,沒有能準確及時預測ddos攻擊發生的有效方法, ddos攻擊的檢測與防護是當前網路安全領域的重要前沿。
  20. In the face of the increasingly complicated threat of network environment, this paper focuses on the study of theories and key technologies of information security operation about network adversary, operation architecture, attack detection, attack prevention, attack deception and vulnerability analysis. the purpose of the researches is to explore new methods for information security assurance so that we can have the initiative on information security

    而對日益復雜網路環境威脅,本文就網路敵手模型、對抗體系、攻擊檢測、攻擊阻斷、攻擊欺騙以及脆弱性分析等信息安全對抗理論和關鍵技術進行研究。其目的在於探索新型的信息安傘保障方法,以掌握信息安全對抗主動權。
分享友人