intrusion monitoring 中文意思是什麼

intrusion monitoring 解釋
侵入監控
  • intrusion : n. 1. 闖入,侵入;干涉,打擾,妨礙。2. 【地質學;地理學】侵入;侵入巖(漿)。
  • monitoring : 劑量測定
  1. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  2. An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf )

    參考通用入侵檢測公共框架( cidf ) ,設計並實現了基於系統調用監控的linux主機入侵檢測系統,在其中採用了hmm檢測演算法。
  3. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  4. After carefully comparing various intrusion detection techniques, the research on hmm applied in hids is proposed, which is based on monitoring linux system calls

    通過對各種入侵檢測技術的分析和比較,確定了在linux系統中基於系統調用監控的主機入侵檢測的方案。
  5. The intrusion detection system based on artificial immune model simulates negative selection, clonal selection, and memory cells in the human immune system and assigns detection to six kinds of functional agents, which are monitoring agents, decision agents, response agents, communication agents, selection agents and testing agents. though sharing information and interaction with each other, these agents can identify anomalous behavior mode

    該系統模擬了人體免疫系統中的負篩選、克隆篩選和記憶細胞等基本工作原理和機制,將入侵檢測的任務分配給監視、決策、響應、通信、篩選和測試等六個功能主體,通過這些主體之間的信息共享、相互協作來識別異常行為模式。
  6. We need to consider not only the defending from attack, but also the tracing and monitoring of attacker, this is the goal of cyber - ids, that is performing intrusion detection from network situation centered viewpoint

    我們需要既考慮攻擊的防護,也要考慮攻擊者的追蹤和監控,這就是c必e卜ids的目的,我們稱之為以網路狀況或態勢為關注焦點。
  7. It is valuable to build a system to count accurately, avoid netvvork mostile intrusion, and analyze netvvork performance. in the paper, a method of counting and monitoring based on host computer is brought forvvard

    研發一套系統能進行網路計費、實時地防止網路惡性入侵行為、有效地對網路性能進行分析具有重要的意義。
  8. The theme comes from several projects, such as " hacker monitoring technology research " ( national 863 program, serial number : 2001aa142100 ), and " integrated network security defensive system " ( national 863 program, serial number : 2003aa142060 ) sponsored by national high - tech research development program ; " intelligence distributive realtime network intrusion defence technology research " ( serial number : 20010699018 ) sponsored by national education department doctor fund

    論文選題來源於國家高技術研究發展計劃資助項目「黑客監控技術研究」 ( 863計劃,課題編號: 2001aa142100 ) 、國家高技術研究發展計劃資助項目「集成化網路安全防衛系統」 ( 863計劃,課題編號: 2003aa142060 ) 、國家博士點基金項目「智能分佈實時網路入侵防禦技術研究」 (課題編號: 20010699018 ) 。
分享友人