檢測入侵者 的英文怎麼說
中文拼音 [jiǎncèrùqīnzhě]
檢測入侵者
英文
detect intruders- 檢 : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
- 測 : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
- 入 : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
- 侵 : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
- 者 : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
- 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
-
Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient
該系統模型利用多代理的思想來構造分散式入侵檢測與響應系統,使之不但兼有基於自治代理和基於移動代理入侵檢測的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵檢測系統普遍存在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個自適應模型生成器來為代理自動生成檢測模型,從而使系統能更高效地運作。Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed
由於傳統的網路安全組件在檢測與響應方面缺少協作,自動化程度低甚至需要人工配置,而入侵者卻可能在計算速度等方面大做文章,所以對網路入侵的自動響應已經成為關鍵系統防護中的首要問題,也就是說,我們要求系統在無人參與的情況下,具有協同檢測和自動響應的能力。Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value
入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system
特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路入侵檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。The wide use of network intrusion - detection systems ( nids ) requires efficient test and evaluation technique to assess the quality of these systems. the efficient test and evaluation is not only beneficial to the improvement of product quality for manufactures, but also helpful to the choice of appropriate devices for users
隨著網路入侵檢測系統的廣泛應用,對其進行測試和評估的要求也越來越迫切,開發者希望通過測試和評估發現產品中的不足,用戶希望通過測試和評估來幫助自己選擇合適的網路入侵檢測產品。Intrusion detection - shock detectors, runner and ball - specific standard
侵入者探測.離心調節錘和彈子撞擊的檢測器.特殊標準We can build a relatively perfect defense system by using firewall and ids
將防火墻和入侵檢測系統兩者結合起來,就可以構成一個比較完善的防禦系統。This tool is aim to test the technology of evading ids by utilizing the weaken of network layer and the transmission layer. and then we test the snort by using the tester and the hacker tool, from the result we find a critical problem faced by a network intrusion detection system ( nids ) is that of ambiguity is the main reason that producing the make false positive and false negative
通過該工具與第三方黑客軟體? fragroute相結合,對入侵檢測系統軟體- - snort進行測試,從結果的分析中得知網路入侵檢測體系所面臨的語義模糊性問題是造成漏報率和誤報率很高的一個主要原因,入侵者就可能利用這一漏洞逃過nids的檢測或者引起檢測系統的誤警。Traditional intrusion detection system collect and analyze a large number of host ’ s log files or network packets, it will reduce the performance of system
傳統的入侵檢測系統採集分析大量的主機日誌或者網路數據包流量,降低了系統的性能。This thesis concentrates on the study of technical specifications of nids. we investigate the market requirements of nids and test more than ten devices of nids. based on the above works, we propose technical specifications to regulate the functionality, performance as well as physical interface of nids in a network having limited bandwidth to 100m hz
在這個目標指導下,作者悉心研究國內外相關文獻,組織人員進行廣泛深入的市場需求調研,並對十餘款網路入侵檢測產品進行了系統、全面的測試,最終提出了網路入侵檢測產品技術規范,對於100m網路帶寬下的網路入侵檢測產品應具備的功能特點、性能指標及介面特徵提出了明確的技術要求。At this point, the only applications that should be developed for a wireless environment are those that are not mission - critical or that are protected with firewalls, token devices for authentication, encryption, and intrusion detection systems
目前,針對無線環境應該開發的唯一應用程序是那些非任務關鍵型的應用程序,或者是受防火墻、用於認證的令牌設備、加密以及入侵檢測系統( intrusion detection systems )保護的應用程序。This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls
在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前者包括針對網站的安全控制,如包括防火墻策略、入侵檢測和系統掃描、 ca數字證書體系、安全控制等,後者以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。The application of ixp1200 network processor includes much service exchange computer, routers, service provider / integration platform of communication company and corporation edge ; core system of much g bit router ; virtual private network, firewall and intrusion detection systems ; voip gateway and web exchange device
Ixp1200網路處理器應用領域包括:多服務交換機、路由器、服務提供者通信公司及企業邊緣的集成平臺;包括多個g比特路由器的核心系統; vpn 、防火墻和入侵檢測系統; voip網關和web交換設置。Due to the some normal ids ' s low efficiency, high error report rate, bad self - security, this thesis has given out a new - type hybrid intrusion detection system ( hsids ) design with high efficiently, good self - security, combining the distrubited information gathering with the centralized managerment, and combining the nid and the hid. the detailed design scheme also has been presented. the hsids adopts the " black hole " hidden setting, greatly decreasing the posiblity for hacker to discover and attack the hsids
在hsids中,採用「黑洞」式隱形設置,可以大大減少hsids系統被黑客發現並攻擊的可能;系統採用的將nid與hid相結合的方式可降低入侵信息的漏報與誤報率;改進的檢測演算法提高了檢測引擎的速度;採用開放的檢測規則方便了系統的升級,提升了檢測能力; web方式的安全管理可以很好地控制整個監控網路的安全情況;被動防禦與主動防禦相結合更有效的防止了入侵者對系統的入侵。So network security becomes the sticking point of internet applications. in order to enhance the security of internet, provide steady and safe services, a lot of security technologies and measures are used to protect the networks. intrusion detection is one of those technologies that have done well in this field
網路安全技術是計算機工作者在解決網路安全問題的過程中不斷拓展和豐富的一門學科,它包括防火墻技術, vpn技術,加密技術,病毒防治技術,入侵檢測技術等。Based on the prototype, a demo of the active firewall, tx - defendingl. o, which includes package filter firewall, real - time intrusion detection, central event manager in and network security policy database, is designed and implemented
在主動防火墻的概念模型的基礎上,本文實現了基於linux具有實時入侵檢測、包過濾防火墻、中心事件管理者以及安全策略庫的完整的主動防火墻原型系統tx - defending1 . 0 。We developed an ids based on the artificial immune model. in this model, there exists one primary ids ( it is in charge of rule generating. ) and several secondary ids ( they receive the rule form primary ids and detect the intrusion. )
計算機免疫系統是模仿人體免疫系統的機理構造出來,包括主ids (負責生成規則)和從ids (負責從主ids接收規則並進行檢測) ,依靠兩者的協作來完成入侵檢測的系統。After analyzing the main modes of the intrusion dectection system currently, the author gives readers new intrusion dectection system based common vulnerabilities & exposures. the author also describes the architecture and their functions and the design and the implement of the software on the duplicated fault tolerance
作者在深入細致地分析、比較了當前常見的入侵檢測系統的設計原理、設計思路、實現方法及其性能優缺點后,提出了一種新型的基於cve的實時入侵檢測系統,闡述了該解決方案中的設計思路、設計原理、各部分的組成、功能以及設計方案實現過程,並且利用了數據挖掘技術對所採集的數據進行了分析和研究。An intruder locating system based on network intrusion detection
基於網路入侵檢測的入侵者定位系統The pnids combines firewall and intrusion detection, it has both their advantages. it conquers their isolating application limitation in tradition, therefore, it has the ability of detection, report and response
Pnids系統將防火墻技術和入侵檢測技術合二為一,它結合了兩者的優勢,克服了傳統的防火墻技術和入侵檢測技術孤立應用的局限性,提供了集成化的訪問控制、檢測和響應功能。分享友人