intrusion system 中文意思是什麼

intrusion system 解釋
侵入探測系統
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Nowadays, the intrusion detection is one important task which fulfills active defense to networks and information. ids ( intrusion detection system ) is analogous to the is ( immune system )

    鑒於此,一種新型的、能實現網路主動防衛的技術? ?網路入侵檢測( intrusiondetection )技術成為一個重要的研究課題。
  2. Since aglet was developed by pure java language, the intrusion detection system can be easily transplanted to various kinds of system platforms

    由於aglet是採用純java開發的,因此本入侵檢測系統可以很方便地移植到各種系統平臺。
  3. In this paper, we introduce the intrusion detection system in the following aspects such as intrusion detection model, detection theory based on which we provide an intrusion detection system based on mobile agent

    本文通過對現有的入侵檢測系統的模型、檢測原理進行分析研究,提出了一個基於aglet移動代理平臺的入侵檢測系統。
  4. In chapter 4, a new data mining - based adaptive models generation ( amg ) is introduced. amg is a real - time architecture for implementing data mining - based intrusion detection system

    第四章:介紹基於數據挖掘自適應模型生成( amg ) , amg是提供了一個基於數據挖掘的實時入侵檢測結構。
  5. ( 3 ) a new framework about data mining - based adaptive models generation ( amg ) is introduced. through the experiment of real - time snort system, it makes the academic and practicable base in order to design practicable system of intrusion detection in the future

    ( 3 )引人基於數據挖掘的amg架構,通過snort實時系統的使用,為進一步設計實用的基於數據挖掘的入侵檢測系統打下理論和實踐基礎。
  6. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統模型利用多代理的思想來構造分散式入侵檢測與響應系統,使之不但兼有基於自治代理和基於移動代理入侵檢測的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵檢測系統普遍存在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個自適應模型生成器來為代理自動生成檢測模型,從而使系統能更高效地運作。
  7. We use artificial immune principles to design a novel antibody network which based on the immune algorithm and neural network, and use these as in - depth research of the application of our achievement to engineering. in this paper, we built the novel antibody network which based on the two intelligence algorithms and reach the application of its use in the intrusion detection system. furthermore we create an ideal antitype system from it

    本課題以人工免疫系統和神經網路為研究對象,並依託四川省科技廳基礎項目「智能入侵檢測系統的關鍵技術研究」 (項目編號: 04jy029 - 017 - 1 ) ,將人工免疫原理和神經網路技術相結合,提出了應用於入侵檢測系統的新型抗體網路,為該項目在工程領域中的進一步研究、應用提供理論依據
  8. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  9. Through - the - wall surveillance radar ( twsr ) is a new radar system, which can detect the suspicious objects without intrusion and surveil the moving targets inside the building or blindage. it can be widely used for urban - warfare, counter - terrorism and hostage rescue. based on the requirement of the development of twsr, this paper analyzes the penetrating property of electromagnetic wave to nonmetallic walls

    穿墻探測雷達( through - the - wallsurveillanceradar , twsr )是一種能夠隔墻探測和定位的新型雷達系統,它可以對建築或掩體內的可疑目標(人)進行外部的非入侵式探測,並對建築物內的運動目標進行監測,可以廣泛的應用於大規模城區巷戰、反恐斗爭和人質救援行動。
  10. On intrusion - detecting system based on bp net algorithm

    網路演算法的入侵檢測系統
  11. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  12. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  13. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  14. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移動代理系統ibmaglets設計了一種基於移動代理的入侵檢測系統框架,並設計了不同功能的移動代理,分析多個移動代理協作進行數據採集與跟蹤檢測入侵攻擊的過程,這些移動代理實時跟蹤監視網路設備和主機,了解網路上的流量和主機的狀態,並對結果數據進行分析審計,做出一定的響應。
  15. Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience

    這些模式可用來指導系統屬性的選擇和構造,挖掘生成出有用的系統或者用戶的行為模式(正常的或者異常的) ;通過比較當前的系統行為模式和已有的模式規則的相似度來發現已知或者未知的誤用入侵和異常入侵活動。
  16. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  17. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包過濾技術由於其自身的缺陷而不能提供完全的安全保護。入侵檢測作為一種主動防禦技術,是包過濾的重要補充,起到了第二道防線的作用。內容過濾彌補了前兩種技術在信息內容防範方面的不足,形成了安全防護的最後一道屏障。
  18. The base principles of the network intrusion detection system and some kinds of typical intrusion detection system are briefly described. then, a new network intrusion detection system based on data mining is given

    簡要地介紹網路入侵檢測系統的基本原理模型和幾種典型的入侵檢測系統,給出了一種基於數據挖掘的網路入侵檢測系統檢測引擎的設計模型。
  19. An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf )

    參考通用入侵檢測公共框架( cidf ) ,設計並實現了基於系統調用監控的linux主機入侵檢測系統,在其中採用了hmm檢測演算法。
  20. After comparing several pattern matching algorithms, we put forward a kind of improved pattern matching algorithm called bmhsy, then basing on some research on network intrusion system and host intrusion system, we give a hybrid intrusion detection system, which combines the advantage of bm, bmh and bmhs, at last present performance analysis in actual environment. the main work of this paper is as follows. ( 1 ) by comparing bm, bmh and bmhs pattern matching algorithm, we give a improved pattern matching algorithm which used of the thought of bm algorithm, and combined the advantage of bmh and bmhs

    本論文通過比較入侵檢測中常用的幾種模式匹配演算法,提出了一種bmhsy演算法,它綜合bmh和bmhs的特點,並針對其效率問題進行了改進;在研究基於主機的入侵檢測技術和基於網路的入侵檢測技術的基礎上,結合兩種技術特點,採用分散式混合型體系結構,研製了一個混合入侵檢測系統,對其實際運行結果和性能進行了分析。
分享友人