But, it is limited to use anomaly detection and misuse detection in practice.
但是在实际中的应用仍然局限于异常检测和误用检测。
Currently, misuse detection is comparatively mature but there are still many problems about anomaly detection.
目前,滥用检测技术已经相对成熟,而异常检测还存在大量问题难以解决。
The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.
当前的入侵检测技术主要有基于规则的误用检测和基于统计的异常检测。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
The complexity of coordinated attacks is difficult to detect efficiently by using the traditional methods such as misuse detection and anomaly detection.
由于协同攻击的复杂性,使传统检测方法难以对其进行有效地检测。
For the complexity of coordinated attacks, it is difficult to detect them efficiently by using the traditional methods such as misuse detection and anomaly detection.
协同攻击的复杂性使传统检测方法难以对其进行有效的检测。
The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.
其中规则库中包含正常行为规则和异常行为规则,使得原型系统在理论上既可实现误用检测也可实现异常检测,并采用关联规则挖掘模块对网络连接数据进行处理。
This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.
对检测入侵方法中的两种方法——异常入侵检测和误用入侵检测进行了描述,介绍了这两种方法中采用的各种不同的检测技术。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
By constructing state machine and get information from it, this approach can contain both anomaly-based and misuse-based intrusion detection methods, and gain the better detection capability.
通过构建状态机并从其中提取出相关信息,不仅可以同时兼顾基于误用和基于异常的两种检测方法,而且使得它们获得了更好的检测效果。
The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.
数据分析融合了异常检测和误用检测两种方法,提出了相应的检测模型,并引入了滤噪函数。
The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测系统(IDS)的主要目标是检测计算机系统内部或外部入侵者的非授权使用、误用和滥用。
The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.
测试结果表明,经过模糊变换的恶意代码能够逃避大部分基于误用检测的恶意代码对抗工具。
For reducing the false alarm, we adopt hierarchical alert classifier which combined misuse intrusion detection and anomaly intrusion detection.
并且采取结合了不当行为与异常行为侦测的阶层式警报分类器来降低假警报。
The neural network is trained and applied to misuse intrusion detection cases.
对混合网络进行训练后,将该网络用于滥用入侵检测。
Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.
然后分析入侵检测技术。比较异常检测和滥用检测各自的优缺点,以及各种检测方法的数据来源。
The two popular detection modes, Misuse mode and Anomaly mode, have been taken into the design of detection part of the Agent.
系统在设计检测部分时,采用了两种检测模式:误用模式和异常模式。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.
入侵检测作为一种主动的安全防护技术。提供对内部攻击、外部攻击和误操作的实时保护。
Absrtact: Invasion eigenvalue and discovery algorithm are the key technologies to misuse intrusion detection technology.
摘要:入侵特征值识别和发现算法是误用入侵检测中的关键技术。
In doing so, this provides a convenient means of managing and reacting to misuse using both types of intrusion detection.
这样做得的好处是,对于使用这两种类型的入侵检测可以提供简单管理的和降低误报的便利方式。
The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.
入侵检测按照检测技术分为两类:基于异常的入侵检测和基于误用的入侵检测。
According to the differences of intrusion detection theory, it includes misuse-based detection and anomaly-based intrusion.
根据入侵检测原理的不同,入侵检测可分为误用检测和异常检测两种。
Then misuse intrusion detection and anomaly intrusion detection of IDS's are represented .
介绍了入侵检测中的滥用检测和异常检测。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.
在文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备的环境条件。
应用推荐