mechanism of intrusion 中文意思是什麼

mechanism of intrusion 解釋
侵入機理
  • mechanism : n 1 (機械)結構;機械裝置[作用];(故事的)結構。2 【哲學】機械論 (opp vitalism)。 3 【文藝】...
  • of : OF =Old French 古法語。
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  1. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  2. The results show that a warm high ridge at the middle level and transformed surface cold high over the plain provide a good background condition ; a cooling process produced by net surface radiation fluxes is the trigger and strengthening mechanism for the fog event ; the subsidence flow at the middle and low tropospheric levels is favorable for the setting - up and maintenance of stable stratification at the boundary layer and weak wind condition at the ground layer over the fog region ; the transportation of weak warm advection at lower levels and weak lift motion at the boundary layer play a very important role to the long maintenance of the fog event ; the intrusion of north wind accompanied by cold advection is a main dynamic factor of the fog dissipation

    結果表明:在中高層暖性高壓脊及地面變性冷高壓穩定維持的大尺度背景條件下,地表凈輻射引起的近地層冷卻是大霧過程的觸發和加強機制;中低空下沉氣流的存在有助於近地層的弱風條件和穩定層結的建立;低層暖平流的輸入和邊界層的淺層抬升是大霧長時間持續的原因;伴隨冷空氣南下的偏北大風是驅使大霧消散的動力因子。
  3. The developing trend of intrusion detection technique is also summarized in the first part of the thesis. the intrusion detection system supporting ipv4, ipv6 and transition mechanism is designed. by analyzing the capture procedure and bottleneck of linux operating system we point out that using technology of napi 、 memory mapping can increase the capturing efficiency and detection accuracy which result in the low rate of error report, lose report

    論文在綜合使用入侵檢測技術的基礎上,開展了以下幾個方面的研究工作: 1 、簡明扼要地介紹了入侵檢測技術的概念、基本模型、歷史和分類,總結了現有入侵檢測技術的發展趨勢,設計了支持ipv4 、 ipv6以及其過渡機制下的入侵檢測系統,並對linux系統中的捕包過程和瓶頸進行了分析,通過使用napi 、內存映射等技術提高了捕包效率和檢測的準確度,降低了誤報、漏報率。
  4. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  5. In view of the influence of equivalent conversion distortion in fuzzy conversion process and difference in network records attribute, this paper puts forward such conception as the key attribute table, attributes effect degree and attribute types list, and bring the dynamic feedback mechanism into intrusion detection system, proposes an adaptive intrusion detection method based on the theory of fuzzy

    摘要針對模糊轉換過程中等價轉換失真問題和網路記錄中屬性差異對入侵檢測造成的影響,提出關鍵屬性列表、屬性作用度列表和屬性類型列表等概念,將動態反饋機制引入入侵檢測,提出一種基於模糊理論的自適應入侵檢測方法。
  6. To optimize the security problem of manet, a cooperative intrusion detection mechanism was proposed based on clustering architecture. the cooperative and communicable measures between clusters were discussed, and then the algorithm for cluster formation w.

    為了優化manet的安全性問題,將分簇機制應用到manet的入侵檢測中,設計了相關的分簇演算法,通信機制和協同檢測機制。
  7. The techniques need unite network security mechanism and intrusion prevention mechanism in order to insuring system usability. in this dissertation, the conceptual architecture of such a system was described, and our experience with its initial implementation was described

    其中,防火墻系統與入侵檢測系統的聯動是目前動態防禦技術研究的熱點問題,它結合了傳統的網路安全機制和入侵防禦機制,可從多方面確保系統的可用性。
  8. It is shown that ripper is superior to other algorithms in terms of complexity in computation, classified precision and noisy data adaptability because of its adoption of the repeated incremental reduction mechanism, and it is more suitable to the intrusion detection

    由於ripper分類演算法採用了重復增量裁減機制,所以在計算復雜性、分類精度、噪音數據適應性等方面都優于其它分類演算法,更適用於入侵檢測建模使用。
  9. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. in this technique, a markov chain model is used to represent a temporal profile of normal behavior of a process. the markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on unix system

    傳統的入侵檢測技術,依照所基於的原則不同,通常分為誤用入侵檢測與異常入侵檢測,本文在入侵研究中所採用的計算機系統免疫思想的基礎上,提出了一種新的異常入侵檢測技術,通過對( unix系統)特權進程系統調用序列的歷史數據的學習,用馬爾可夫鏈模型來建立特權進程的正常時態行為輪廓。
分享友人