檢測入侵者 的英文怎麼說

中文拼音 [jiǎnqīnzhě]
檢測入侵者 英文
detect intruders
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  1. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統模型利用多代理的思想來構造分散式與響應系統,使之不但兼有基於自治代理和基於移動代理的優點,又克服了它們各自存在的一些缺陷;針對基於代理的系統普遍存在的代理配置復雜問題,作結合信息論的思想從理論上設計了一個自適應模型生成器來為代理自動生成模型,從而使系統能更高效地運作。
  2. Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed

    由於傳統的網路安全組件在與響應方面缺少協作,自動化程度低甚至需要人工配置,而卻可能在計算速度等方面大做文章,所以對網路的自動響應已經成為關鍵系統防護中的首要問題,也就是說,我們要求系統在無人參與的情況下,具有協同和自動響應的能力。
  3. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    分析技術是系統的核心,主要分為異常和誤用。作在對傳統網路安全模型、 ppdr模型、原理以及常用技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於系統中,解決了傳統的bp演算法的收斂速度慢、易陷局部最小點的問題。
  4. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  5. The wide use of network intrusion - detection systems ( nids ) requires efficient test and evaluation technique to assess the quality of these systems. the efficient test and evaluation is not only beneficial to the improvement of product quality for manufactures, but also helpful to the choice of appropriate devices for users

    隨著網路系統的廣泛應用,對其進行試和評估的要求也越來越迫切,開發希望通過試和評估發現產品中的不足,用戶希望通過試和評估來幫助自己選擇合適的網路產品。
  6. Intrusion detection - shock detectors, runner and ball - specific standard

    .離心調節錘和彈子撞擊的器.特殊標準
  7. We can build a relatively perfect defense system by using firewall and ids

    將防火墻和系統兩結合起來,就可以構成一個比較完善的防禦系統。
  8. This tool is aim to test the technology of evading ids by utilizing the weaken of network layer and the transmission layer. and then we test the snort by using the tester and the hacker tool, from the result we find a critical problem faced by a network intrusion detection system ( nids ) is that of ambiguity is the main reason that producing the make false positive and false negative

    通過該工具與第三方黑客軟體? fragroute相結合,對系統軟體- - snort進行試,從結果的分析中得知網路體系所面臨的語義模糊性問題是造成漏報率和誤報率很高的一個主要原因,就可能利用這一漏洞逃過nids的引起系統的誤警。
  9. Traditional intrusion detection system collect and analyze a large number of host ’ s log files or network packets, it will reduce the performance of system

    傳統的系統採集分析大量的主機日誌或網路數據包流量,降低了系統的性能。
  10. This thesis concentrates on the study of technical specifications of nids. we investigate the market requirements of nids and test more than ten devices of nids. based on the above works, we propose technical specifications to regulate the functionality, performance as well as physical interface of nids in a network having limited bandwidth to 100m hz

    在這個目標指導下,作悉心研究國內外相關文獻,組織人員進行廣泛深的市場需求調研,並對十餘款網路產品進行了系統、全面的試,最終提出了網路產品技術規范,對於100m網路帶寬下的網路產品應具備的功能特點、性能指標及介面特徵提出了明確的技術要求。
  11. At this point, the only applications that should be developed for a wireless environment are those that are not mission - critical or that are protected with firewalls, token devices for authentication, encryption, and intrusion detection systems

    目前,針對無線環境應該開發的唯一應用程序是那些非任務關鍵型的應用程序,或是受防火墻、用於認證的令牌設備、加密以及系統( intrusion detection systems )保護的應用程序。
  12. This thesis demonstrated in detail the bank organization, operation procedures, security requirement analysis, etc. it also lucubrated the information security theory, and analyzed the information security structural levels. based on the above results, a security design scheme was developed from a technically and operationally integrated consideration for e - banking system in beijing agriculture bank. technique factors consisted of security controls of website, including the firewall strategies, break - in testing and system scanning, ca digital certification system and security controls

    在研究了信息安全的相關理論的基礎上,提出了北京農行網上銀行系統的技術和業務上綜合考慮的安全設計方案,前包括針對網站的安全控制,如包括防火墻策略、和系統掃描、 ca數字證書體系、安全控制等,後以個人業務、對公業務、銀券通業務等流程說明業務的安全實現。
  13. The application of ixp1200 network processor includes much service exchange computer, routers, service provider / integration platform of communication company and corporation edge ; core system of much g bit router ; virtual private network, firewall and intrusion detection systems ; voip gateway and web exchange device

    Ixp1200網路處理器應用領域包括:多服務交換機、路由器、服務提供通信公司及企業邊緣的集成平臺;包括多個g比特路由器的核心系統; vpn 、防火墻和系統; voip網關和web交換設置。
  14. Due to the some normal ids ' s low efficiency, high error report rate, bad self - security, this thesis has given out a new - type hybrid intrusion detection system ( hsids ) design with high efficiently, good self - security, combining the distrubited information gathering with the centralized managerment, and combining the nid and the hid. the detailed design scheme also has been presented. the hsids adopts the " black hole " hidden setting, greatly decreasing the posiblity for hacker to discover and attack the hsids

    在hsids中,採用「黑洞」式隱形設置,可以大大減少hsids系統被黑客發現並攻擊的可能;系統採用的將nid與hid相結合的方式可降低信息的漏報與誤報率;改進的演算法提高了引擎的速度;採用開放的規則方便了系統的升級,提升了能力; web方式的安全管理可以很好地控制整個監控網路的安全情況;被動防禦與主動防禦相結合更有效的防止了對系統的
  15. So network security becomes the sticking point of internet applications. in order to enhance the security of internet, provide steady and safe services, a lot of security technologies and measures are used to protect the networks. intrusion detection is one of those technologies that have done well in this field

    網路安全技術是計算機工作在解決網路安全問題的過程中不斷拓展和豐富的一門學科,它包括防火墻技術, vpn技術,加密技術,病毒防治技術,技術等。
  16. Based on the prototype, a demo of the active firewall, tx - defendingl. o, which includes package filter firewall, real - time intrusion detection, central event manager in and network security policy database, is designed and implemented

    在主動防火墻的概念模型的基礎上,本文實現了基於linux具有實時、包過濾防火墻、中心事件管理以及安全策略庫的完整的主動防火墻原型系統tx - defending1 . 0 。
  17. We developed an ids based on the artificial immune model. in this model, there exists one primary ids ( it is in charge of rule generating. ) and several secondary ids ( they receive the rule form primary ids and detect the intrusion. )

    計算機免疫系統是模仿人體免疫系統的機理構造出來,包括主ids (負責生成規則)和從ids (負責從主ids接收規則並進行) ,依靠兩的協作來完成的系統。
  18. After analyzing the main modes of the intrusion dectection system currently, the author gives readers new intrusion dectection system based common vulnerabilities & exposures. the author also describes the architecture and their functions and the design and the implement of the software on the duplicated fault tolerance

    在深細致地分析、比較了當前常見的系統的設計原理、設計思路、實現方法及其性能優缺點后,提出了一種新型的基於cve的實時系統,闡述了該解決方案中的設計思路、設計原理、各部分的組成、功能以及設計方案實現過程,並且利用了數據挖掘技術對所採集的數據進行了分析和研究。
  19. An intruder locating system based on network intrusion detection

    基於網路定位系統
  20. The pnids combines firewall and intrusion detection, it has both their advantages. it conquers their isolating application limitation in tradition, therefore, it has the ability of detection, report and response

    Pnids系統將防火墻技術和技術合二為一,它結合了兩的優勢,克服了傳統的防火墻技術和技術孤立應用的局限性,提供了集成化的訪問控制、和響應功能。
分享友人