intrusion detection system 中文意思是什麼

intrusion detection system 解釋
侵入檢查系統
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Nowadays, the intrusion detection is one important task which fulfills active defense to networks and information. ids ( intrusion detection system ) is analogous to the is ( immune system )

    鑒於此,一種新型的、能實現網路主動防衛的技術? ?網路入侵檢測( intrusiondetection )技術成為一個重要的研究課題。
  2. Since aglet was developed by pure java language, the intrusion detection system can be easily transplanted to various kinds of system platforms

    由於aglet是採用純java開發的,因此本入侵檢測系統可以很方便地移植到各種系統平臺。
  3. In this paper, we introduce the intrusion detection system in the following aspects such as intrusion detection model, detection theory based on which we provide an intrusion detection system based on mobile agent

    本文通過對現有的入侵檢測系統的模型、檢測原理進行分析研究,提出了一個基於aglet移動代理平臺的入侵檢測系統。
  4. In chapter 4, a new data mining - based adaptive models generation ( amg ) is introduced. amg is a real - time architecture for implementing data mining - based intrusion detection system

    第四章:介紹基於數據挖掘自適應模型生成( amg ) , amg是提供了一個基於數據挖掘的實時入侵檢測結構。
  5. We use artificial immune principles to design a novel antibody network which based on the immune algorithm and neural network, and use these as in - depth research of the application of our achievement to engineering. in this paper, we built the novel antibody network which based on the two intelligence algorithms and reach the application of its use in the intrusion detection system. furthermore we create an ideal antitype system from it

    本課題以人工免疫系統和神經網路為研究對象,並依託四川省科技廳基礎項目「智能入侵檢測系統的關鍵技術研究」 (項目編號: 04jy029 - 017 - 1 ) ,將人工免疫原理和神經網路技術相結合,提出了應用於入侵檢測系統的新型抗體網路,為該項目在工程領域中的進一步研究、應用提供理論依據
  6. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  7. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  8. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移動代理系統ibmaglets設計了一種基於移動代理的入侵檢測系統框架,並設計了不同功能的移動代理,分析多個移動代理協作進行數據採集與跟蹤檢測入侵攻擊的過程,這些移動代理實時跟蹤監視網路設備和主機,了解網路上的流量和主機的狀態,並對結果數據進行分析審計,做出一定的響應。
  9. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  10. The base principles of the network intrusion detection system and some kinds of typical intrusion detection system are briefly described. then, a new network intrusion detection system based on data mining is given

    簡要地介紹網路入侵檢測系統的基本原理模型和幾種典型的入侵檢測系統,給出了一種基於數據挖掘的網路入侵檢測系統檢測引擎的設計模型。
  11. The paper discusses two standards about intrusion detection : cidf and idwq and talks over its tendency. the paper gives a software implementation for intrusion detection system under linux

    論文還討論了當前兩個有關入侵檢測的標準: cidf標準和idwg標準,並在此基礎上討論了入侵檢測的發展趨勢。
  12. Cidf is a standard of intrusion detection system. the ids is on the basis of cede it is made up of four components : event generator, event analyzer, response unit and policy server. event generator collects events

    Cidf是入侵檢測系統的一個標準,本文在cidf的基礎上設計了一個自己的系統,系統由4今組件組成:事件產生器、事件分析器、響應單元和策略服務器。
  13. The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory dete ctors. so it takes the advantages of anomaly detection and misuse detection, overcomes the natural shortcoming of them and can identify known intrusion and novel intrusion in computer systems

    它同時兼備了異常檢測法和誤用檢測法的優點,克服了兩者固有的缺陷,因此可以識別任何已知或未知的本地主機上的異常行為模式和網路系統中的異常通信模式。
  14. A _ dids has be implemented and run on unix / linux system. it shows that it is a good intrusion detection system

    本文實現了a _ dids的具體功能, a _ dids可以運行在unix linux主機上,經測試證明是一個可行而且先進的入侵檢測系統。
  15. In this paper, after finding out the flaw of present dids and improving on present dids, i find a distributed intrusion detection system, based on data mining technique. we short the new system for dmdids

    本文研究分析目前的dids后,針對目前dids存在的問題,改進得到基於數據挖掘的分散式入侵檢測系統的架構( dmdids ) ,它將基於網路和基於主機的入侵檢測系統有機地結合在一起。
  16. In analyze the deficiency of traditional intrusion detection system, a new kind of intrusion detection method, which named edid ( an intrusion detection method based on euclidean distance ) is put forward for reduce false positive rate

    在此基礎上,將歐氏距離( euclideandistance )引入了入侵檢測系統以降低入侵檢測系統的誤報率,並提出了基於euclidean距離的入侵檢測方法intrusiondetectionbasedoneuclideandistance ( edid ) 。
  17. Naids is the first data mining based anomaly detection system, the first intrusion detection system which lower false positive rate by classification engineering, the first intrusion detection system which put forward sliding windows techniques to carry out incremental, on - line mining

    Naids是第一個基於數據挖掘方法的異常檢測系統,是第一個通過分類引擎來降低誤報率的入侵檢測系統,是第一個提出滑動窗口技術實施在線增量式挖掘的入侵檢測系統。
  18. Subsequently, weighted association rules algorithm is given in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false

    為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文把加權關聯規則演算法應用於入侵檢測系統,此方法能在一定程度上提高了入侵檢測的檢測率也限制了無趣規則的產生,並降低了誤報率。
  19. Subsequently, it in the paper gives weighted association rules algorithm in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false positive rate

    首先我研究了關聯規則的各種實用演算法及其改進演算法,之後為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文給出加權關聯規則詳細的演算法說明,並將此方法應用於入侵檢測。
  20. Analysis and research of network intrusion - detection system

    的分析與研究
分享友人