• Describing normal behaviors is one of the difficulties that an anomaly detection system faces.

    正常行为描述异常检测系统必须要解决好的核心问题之一

    youdao

  • The network anomaly detection system is made of three modules mainly: data collection module, anomaly judgement module and alert analyse module.

    本文的网络异常监测系统主要分为三个模块数据采集模块、异常判定模块告警分析模块。

    youdao

  • To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法的异常检测模型(QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。

    youdao

  • This system has three functions: misused detection, anomaly detection, and attack source traceback.

    系统实现了误用检测异常检测、攻击追踪三个方面的功能

    youdao

  • The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.

    其中规则包含正常行为规则异常行为规则,使得原型系统在理论上既实现误用检测也可实现异常检测,采用关联规则挖掘模块网络连接数据进行处理。

    youdao

  • A new anomaly detection model based on system call macro was presented.

    提出基于系统调用异常检测模型

    youdao

  • This paper presents a new method based on TCP packet anomaly detection (THAD) to detect system scans.

    该文提出基于TCP包头异常检测系统扫描检测方法THAD

    youdao

  • We focus on the issues related to found a HMM for the behavior of system, and bring forward an algorithm of anomaly detection relied on node.

    首先建立了系统运行HMM模型基础上提出依赖节点异常检测算法

    youdao

  • Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.

    给出了针对无线网络入侵检测模型网络异常行为检测策略

    youdao

  • This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .

    ANIDS是基于异常检测技术的入侵检测系统两个方面实现异常检测。

    youdao

  • Use data mining methods to analyze the audit data and provide anomaly detection based on the generated normal patterns, this method can improve the performance of intrusion detection system.

    利用数据挖掘技术审计数据加以分析,总结出一些正常模式,用来进行异常检测,将有助于提高入侵检测系统检测准确性和完备性。

    youdao

  • This paper discussed the problem of anomaly detection in computer immune system roundly and deeply.

    本文异常检测计算机免疫系统全面深入地讨论了这个问题

    youdao

  • A new two-layer Markov chains anomaly detection model that operated on system call traces was presented.

    提出了一个两层马尔可夫异常入侵检测模型

    youdao

  • The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测。

    youdao

  • For the anomaly detection in the vibration time series of the rotor system, a real-valued negative selection algorithm based on Euclidean distance has been implemented.

    针对转子振动时间序列异常数据检测问题,采用距离进行匹配计算,实数域实现了选择算法

    youdao

  • This module incorporate system call anomaly detection modeling methods and monitor file systems and Registry accesses.

    模块是以系统调用检测为核心并且结合文件监控注册表监控功能。

    youdao

  • On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.

    针对异常发现技术模式匹配技术各有利弊特点,设计了种技术综合运用网络入侵检测系统

    youdao

  • Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.

    最后本文系统模型应用于网络拒绝服务攻击环境的实例进行了分析,提出了一种应用聚类分析对系统改进方法

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

  • For the purpose of protecting system resource, process behaviors anomaly at runtime was analyzed and summarized, and a program anomaly detection approach was put forward based on behaviors analysis.

    使用这些方法调用系统资源,可以有效地提高程序开发效率,实现更复杂的程序功能,使程序具有较高的专业水平,同时给出具体实例

    youdao

  • For the purpose of protecting system resource, process behaviors anomaly at runtime was analyzed and summarized, and a program anomaly detection approach was put forward based on behaviors analysis.

    使用这些方法调用系统资源,可以有效地提高程序开发效率,实现更复杂的程序功能,使程序具有较高的专业水平,同时给出具体实例

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定