網路入侵 的英文怎麼說

中文拼音 [wǎngqīn]
網路入侵 英文
hackers
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Nowadays, the intrusion detection is one important task which fulfills active defense to networks and information. ids ( intrusion detection system ) is analogous to the is ( immune system )

    鑒於此,一種新型的、能實現主動防衛的技術? ?網路入侵檢測( intrusiondetection )技術成為一個重要的研究課題。
  2. Application of negative selection algorism in network intrusion detection

    否定選擇演算法在網路入侵檢測中的應用
  3. The following are the main achievements : distributed network measurement and analysis infrastructure ( dnmai ), the cooperant result of all the researchers of our workgroup, is discussed in detail, and also the important status of the network intrusion detection and network vulnerability analysis in dnmai

    研究成果如下:系統地介紹了本項目組全體成員共同創作的一種分散式測量與分析基礎架構dnmai ( distributednetworkmeasurementandanalysisinfrastructure )及網路入侵檢測系統和脆弱性分析系統在其中的重要地位和作用。
  4. In this paper, a new model of network intrusion detection based on active counterwork response is proposed

    在本論文中,我們提出了基於主動對抗響應的網路入侵檢測模型。
  5. It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively

    為了有效地對付網路入侵行為,對埠掃描進行研究是非常有益和必要的。
  6. According to the statistic result 80 % of told secret and network inbreak come from the inner network. the security problem produced by internal network misuse has become a kind of difficult problem in the research field of network security management

    統計表明,全球80 %以上的泄密和網路入侵來自於內部,因此內部誤用行為引起的安全問題已日益成為安全管理研究領域中的一個難題。
  7. Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed

    由於傳統的安全組件在檢測與響應方面缺少協作,自動化程度低甚至需要人工配置,而者卻可能在計算速度等方面大做文章,所以對網路入侵的自動響應已經成為關鍵系統防護中的首要問題,也就是說,我們要求系統在無人參與的情況下,具有協同檢測和自動響應的能力。
  8. Real - time anomaly detection of network intrusions

    網路入侵異常檢測的實時方法
  9. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在安全系統建設的過程中,獨立承擔了中心子防火墻、網路入侵檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈加密、 pki ca體系的建設和使用原理的基礎上,參與了基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《ip地址規范》 ,為本單位安全建設規劃提出了意見和建議。
  10. The base principles of the network intrusion detection system and some kinds of typical intrusion detection system are briefly described. then, a new network intrusion detection system based on data mining is given

    簡要地介紹網路入侵檢測系統的基本原理模型和幾種典型的檢測系統,給出了一種基於數據挖掘的網路入侵檢測系統檢測引擎的設計模型。
  11. The thesis present a high level asl ( auditing specification language ) to describe the safe behaviour of system and the intrusive behaviour of network

    本文引一種高層的asl ( auditspecificationlanguage )描述語言來描述系統安全行為和網路入侵行為。
  12. At the same time, the dids also get the very quick development

    同時,網路入侵檢測系統也得到了很快的發展。
  13. When an intrusion is detected, the intrusion - detection system can react in a number of ways - - from alerting a systems administrator and recommending various actions to automatically kicking the intruder off the network

    當探測到時,探測系統以多種方法作出反應- -從警告系統管理員和推薦不同的動作,到自動打掉網路入侵者。
  14. The wide use of network intrusion - detection systems ( nids ) requires efficient test and evaluation technique to assess the quality of these systems. the efficient test and evaluation is not only beneficial to the improvement of product quality for manufactures, but also helpful to the choice of appropriate devices for users

    隨著網路入侵檢測系統的廣泛應用,對其進行測試和評估的要求也越來越迫切,開發者希望通過測試和評估發現產品中的不足,用戶希望通過測試和評估來幫助自己選擇合適的網路入侵檢測產品。
  15. The defense - in - dynamic & depth cissa model and the cooperative communication platform which are put forward in this paper have been applied into " the network intrusion detection, the warning and the security management technology " ( 863 program ), which lays the foundations for the successful examination of 863 experts

    本文所提出的動態縱深防禦安全體系模型以及協同通信平臺,已經在「網路入侵檢測、預警和安全管理技術(戰略預警) 」 ( 「十五」 863計劃)中得到了應用,為863項目順利通過驗收打下了堅實的基礎。
  16. 2 ) the growth of network bandwidth requires that intrusion detection systems have high performance than ever. in this paper, some effective load balancing policies are presented. by using load balancer, the overall detection efficiency of nids can be increased

    2 )針對帶寬的增加對網路入侵檢測系統提出的性能要求,提出了相應的負載均衡策略,使用負載均衡器進行nids負載均衡,並採用雙機熱備技術提高負載均衡器的可靠性。
  17. A high effective network intrusion detection system based on tree augmented na ve bayes

    基於樹擴展樸素貝葉斯的高效網路入侵檢測系統
  18. In order to resolve the problem of low accuracy, computing overhead and the high false negative probability that the current detection technology suffered, the protocol misuage detection becomes one of the research fields in the development of network intrusion detection

    針對基於模式匹配方法的誤用檢測技術存在的檢測率低、計算量大和高漏報率等問題,使用協議分析方法實現異常檢測技術成了網路入侵檢測的重要研究方向。
  19. In addition, the paper studies the drawbacks of the existing network invasion detecting system and concludes that the basic reason why the users are not satisfied with them is that it is hard to reduce both the misinformation rate and the rate of failing to report simultaneously. then, it presents that attack defending system and invasion analyzing system are the two key orientations for the development of invasion detecting system, and also analyzes and explores their corresponding technological requirements

    文中對當前網路入侵檢測系統的不足進行了深的分析,認為誤報率和漏報率難以同時降低是導致用戶對其不滿的根本原因,指出:攻擊防護系統和分析系統將是檢測系統發展的兩個主要方向,並對相應的技術要求進行了分析和探討。
  20. The overall management portion must be protected from intrusion at the network level

    整個管理部分必須受到保護,防止網路入侵
分享友人