intrusion response 中文意思是什麼

intrusion response 解釋
侵擾反應
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  • response : n. 1. 回答,答復。2. 【宗教】應唱聖歌。3. (因刺激等引起的)感應,反應,反響;應驗;【物理學】響應;【無線電】靈敏度,感擾性;特性曲線。
  1. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統模型利用多代理的思想來構造分散式入侵檢測與響應系統,使之不但兼有基於自治代理和基於移動代理入侵檢測的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵檢測系統普遍存在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個自適應模型生成器來為代理自動生成檢測模型,從而使系統能更高效地運作。
  2. In this paper, a new model of network intrusion detection based on active counterwork response is proposed

    在本論文中,我們提出了基於主動對抗響應的網路入侵檢測模型。
  3. Cidf is a standard of intrusion detection system. the ids is on the basis of cede it is made up of four components : event generator, event analyzer, response unit and policy server. event generator collects events

    Cidf是入侵檢測系統的一個標準,本文在cidf的基礎上設計了一個自己的系統,系統由4今組件組成:事件產生器、事件分析器、響應單元和策略服務器。
  4. The topic of the thesis is to research fast response system ( frs ). the research aims to construct the architecture of frs for detecting intrusion, tracing attack source, correlating alerts, evaluating the damage of attack, describing attack, and taking automatic response to attack. three related projects, cooperative intrusion traceback and response architecture ( citra ), automatic intrusion detection environment, and adaptive, agent - based, intrusion response system ( aairs ), are analyzed

    本文旨在對快速反應技術進行研究,建立針對網路攻擊的快速反應系統,該系統具有入侵檢測、攻擊源回溯功能;通過報警信息的關聯、攻擊破壞力的分析,以及攻擊的準確描述,完成對常見網路攻擊的準確定義;並且根據攻擊描述信息,自動對攻擊進行響應,達到有效地阻止攻擊的目的。
  5. The agent system of a _ dids consists of four modules : monitor agent, state detection agent, intrusion detection agent and auto response agent. every agent works independently and together to accomplish intrusion detection

    A _ dids的代理體系由監控代理、狀態檢測代理、入侵檢測代理和自動響應代理組成,代理之間各自獨立又相互協作,合作完成入侵檢測的任務。
  6. Adaptive intrusion response system ( airs ) could make automatic response to intrusion and support for multiple ids which monitor network and generate intrusion alarms

    自適應入侵響應系統是一個自動化響應系統,同時支持多個入侵檢測系統對網路進行監視。
  7. Intrusion - detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion

    入侵探測系統是用來探測計算機系統網路上不尋常的活動,以識別出此活動是不友好的或者未經授權的,以便能夠對此入侵作出響應。
  8. Current security systems detect intrusion locally and response locally. this technology ca n ' t identify true source of attacker, and effectively respond to attacker in entire network level

    將入侵響應局限在受攻擊子網或受攻擊安全管理域內,不能有效阻擋日趨嚴重的分散式攻擊。
  9. We design a component - based intrusion detection system, which has good distribute and scalable ability. it combine the network - based ids and host - based eds into a system, and provide detection, report and response together

    論文中提出了一種基於部件的入侵檢測系統,這是將基於網路和基於主機和入侵檢測系統有機地結合地一起,提供集成化的檢測、報告和響應功能。
  10. The intrusion detection system based on artificial immune model simulates negative selection, clonal selection, and memory cells in the human immune system and assigns detection to six kinds of functional agents, which are monitoring agents, decision agents, response agents, communication agents, selection agents and testing agents. though sharing information and interaction with each other, these agents can identify anomalous behavior mode

    該系統模擬了人體免疫系統中的負篩選、克隆篩選和記憶細胞等基本工作原理和機制,將入侵檢測的任務分配給監視、決策、響應、通信、篩選和測試等六個功能主體,通過這些主體之間的信息共享、相互協作來識別異常行為模式。
  11. Airs classify whether the incident is a continuation of an existing incident or is a new attack, dynamic analysis the incident, cataloging the attack and limit the response based on legal, ethical, institutional or resource constraints. adaptive intrusion response strategies are suggested based on the alarm confidence, attack frequency, assessed risk, and estimated response costs

    系統通過計算報警可信度,限制入侵檢測系統誤報警所產生的負面影響;通過判斷報警信息是新一輪攻擊還是原有攻擊的繼續,動態分析攻擊,調整攻擊類別,評估威脅,並根據受保護系統的安全需求、相關政策、以及響應成功率確定響應機制。
  12. The existing intrusion detection systems mostly work in a " passive " mode in response to network - based intrusions, so their countermeasures are limit locally and negatively in the intruded networks. so there is no active, wan - wide counteraction against detected intrusion

    現有的入侵檢測系統對檢測到的入侵行為的所採取的措施都局限於被動的、本地的響應措施,而缺乏主動的、廣域網范圍內的反擊措施,因此都屬于被動響應網路入侵。
  13. For the main body of the intrusion is coming indirect, the scope of it larger, the techniques are distributing and the object is changing, the intrusion detection system must improve its response speed, data analyzing speed and reduce the miss rate and false alarm rate. this system uses both parallel reasoning and fuzzy reasoning techniques

    由於目前入侵趨于主體對象的間接化、入侵或攻擊的規模擴大、入侵或攻擊技術的分佈化、攻擊對象轉移,因此必須提高入侵檢測系統的實時響應速度、數據處理速度、同時降低系統對漏洞的誤報率和漏報率。
  14. Based on the summary of related studies, this paper presents a common framework for the automated intrusion response system

    本文在對相關研究領域已有工作進行總結的基礎上,提出了一種自動入侵響應系統的通用框架模型。
  15. With a large amount of network attacks, the automated intrusion response system can take timely countermeasures to stop attacks and reduce the loss of system

    面對大量網路攻擊事件,自動入侵響應系統能夠及時採取響應措施阻止攻擊的延續並減小系統損失。
  16. In our decision - support system, a analysis framework, including attack path analysis, attack frequency analysis and attack capability analysis, is proposed to accomplish the intrusion response requirement

    攻擊知識認知的結果是要為決策分析提供支持,根據入侵反擊的目標要求,在主域范圍內提出了:攻擊路線分析、攻擊頻率分析與攻擊能力分析等三個階段的決策支持分析。
  17. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  18. Pco supports the establishment of a self - regulatory press council the pco made a submission to the law reform commission in response to the " consultation paper on the regulation of media intrusion ", in which it supports the establishment of a multi - party self - regulatory " press council " to oversee matters relating to media intrusion

    公署已就《傳播媒介的侵犯私隱行為諮詢文件》 ,向法律改革委員會提交了意見書,並建議成立一個包括各界代表的自律性報業評議會(以下簡稱報評會) ,以監察與傳播媒介的侵犯私隱行為有關的事宜。
  19. We design a cve - based intrusion detection expert system rule base, it combine the network - based ids and host - based ids into a system, and provide detection, report and response together

    本文提出一種基於cve標準建立的入侵檢測專家系統規則庫,該入侵檢測專家系統是基於網路和主機的混合結合體,提供集成化的檢測、報告和響應功能。
  20. The pnids combines firewall and intrusion detection, it has both their advantages. it conquers their isolating application limitation in tradition, therefore, it has the ability of detection, report and response

    Pnids系統將防火墻技術和入侵檢測技術合二為一,它結合了兩者的優勢,克服了傳統的防火墻技術和入侵檢測技術孤立應用的局限性,提供了集成化的訪問控制、檢測和響應功能。
分享友人