intrusion detection 中文意思是什麼

intrusion detection 解釋
侵入竊密檢測
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  1. Nowadays, the intrusion detection is one important task which fulfills active defense to networks and information. ids ( intrusion detection system ) is analogous to the is ( immune system )

    鑒於此,一種新型的、能實現網路主動防衛的技術? ?網路入侵檢測( intrusiondetection )技術成為一個重要的研究課題。
  2. Intrusion detection techniques in ad hoc networks

    無線自組織網中的入侵檢測技術
  3. Since aglet was developed by pure java language, the intrusion detection system can be easily transplanted to various kinds of system platforms

    由於aglet是採用純java開發的,因此本入侵檢測系統可以很方便地移植到各種系統平臺。
  4. In this paper, we introduce the intrusion detection system in the following aspects such as intrusion detection model, detection theory based on which we provide an intrusion detection system based on mobile agent

    本文通過對現有的入侵檢測系統的模型、檢測原理進行分析研究,提出了一個基於aglet移動代理平臺的入侵檢測系統。
  5. Application of negative selection algorism in network intrusion detection

    否定選擇演算法在網路入侵檢測中的應用
  6. In chapter 4, a new data mining - based adaptive models generation ( amg ) is introduced. amg is a real - time architecture for implementing data mining - based intrusion detection system

    第四章:介紹基於數據挖掘自適應模型生成( amg ) , amg是提供了一個基於數據挖掘的實時入侵檢測結構。
  7. ( 3 ) a new framework about data mining - based adaptive models generation ( amg ) is introduced. through the experiment of real - time snort system, it makes the academic and practicable base in order to design practicable system of intrusion detection in the future

    ( 3 )引人基於數據挖掘的amg架構,通過snort實時系統的使用,為進一步設計實用的基於數據挖掘的入侵檢測系統打下理論和實踐基礎。
  8. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統模型利用多代理的思想來構造分散式入侵檢測與響應系統,使之不但兼有基於自治代理和基於移動代理入侵檢測的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵檢測系統普遍存在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個自適應模型生成器來為代理自動生成檢測模型,從而使系統能更高效地運作。
  9. We use artificial immune principles to design a novel antibody network which based on the immune algorithm and neural network, and use these as in - depth research of the application of our achievement to engineering. in this paper, we built the novel antibody network which based on the two intelligence algorithms and reach the application of its use in the intrusion detection system. furthermore we create an ideal antitype system from it

    本課題以人工免疫系統和神經網路為研究對象,並依託四川省科技廳基礎項目「智能入侵檢測系統的關鍵技術研究」 (項目編號: 04jy029 - 017 - 1 ) ,將人工免疫原理和神經網路技術相結合,提出了應用於入侵檢測系統的新型抗體網路,為該項目在工程領域中的進一步研究、應用提供理論依據
  10. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  11. The thesis design the specification of intrusion detection of the privileged program and network communication in the detail by asl specification

    本文用asl詳細的設計了特權程序和網路數據包的入侵檢測的規范。
  12. The following are the main achievements : distributed network measurement and analysis infrastructure ( dnmai ), the cooperant result of all the researchers of our workgroup, is discussed in detail, and also the important status of the network intrusion detection and network vulnerability analysis in dnmai

    研究成果如下:系統地介紹了本項目組全體成員共同創作的一種分散式網路測量與分析基礎架構dnmai ( distributednetworkmeasurementandanalysisinfrastructure )及網路入侵檢測系統和網路脆弱性分析系統在其中的重要地位和作用。
  13. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、防火墻、漏洞防堵、入侵檢測、審計和反攻擊等,其中路由器過濾、防火墻、漏洞防堵屬于靜態安全技術,而入侵檢測、審計和反攻擊等屬于動態防護。
  14. In this paper, a new model of network intrusion detection based on active counterwork response is proposed

    在本論文中,我們提出了基於主動對抗響應的網路入侵檢測模型。
  15. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph

    入侵檢測是一種主動防禦技術,它彌補了防火墻、信息加密等傳統安全技術的不足。
  16. Intrusion detection - alarm systems - alarm systems using wire - free or non specific wired links - specific standard for hertzian links

    侵入檢測.報警系統.無線或普通有線鏈接用報警系統.電磁波鏈接用專用標準
  17. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  18. We do research on the transitions between states of network protocol, the protocol misusage detection model based on markov chain, the framework of the ids technology and protocol anormity after we discuss the current technology. the main research contents of this paper include : research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on

    在分析了現有入侵檢測系統的基礎上,本文圍繞典型網路協議狀態轉換、基於馬爾可夫鏈的檢測模型、入侵檢測技術框架、以及協議異常等幾個方面展開深入研究,主要工作內容包括:典型網路協議轉換狀態的分析和會話過程的研究;基於馬爾可夫鏈的網路異常檢測模型;分散式的檢測架構;針對網路流量特徵而提出了精確的檢測模型等。
  19. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  20. An intrusion detection model based on neural network

    基於神經網路的入侵檢測模型
分享友人