• But, it is limited to use anomaly detection and misuse detection in practice.

    但是在实际中的应用仍然局限于异常检测误用检测。

    youdao

  • Currently, misuse detection is comparatively mature but there are still many problems about anomaly detection.

    目前滥用检测技术已经相对成熟异常检测存在大量问题难以解决。

    youdao

  • The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.

    当前入侵检测技术主要有基于规则的误用检测基于统计异常检测。

    youdao

  • On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    网络入侵检测算法方面本文异常误用检测算法进行了研究

    youdao

  • The complexity of coordinated attacks is difficult to detect efficiently by using the traditional methods such as misuse detection and anomaly detection.

    由于协同攻击复杂性,使传统检测方法难以进行有效地检测。

    youdao

  • For the complexity of coordinated attacks, it is difficult to detect them efficiently by using the traditional methods such as misuse detection and anomaly detection.

    协同攻击复杂性使传统检测方法难以进行有效检测。

    youdao

  • The rule sets of the system include normal behavior rules and abnormal behavior rules, it make the system can carry out the anomaly detection and misuse detection in theory.

    其中规则包含正常行为规则异常行为规则,使得原型系统在理论上既实现误用检测也可实现异常检测,采用关联规则挖掘模块网络连接数据进行处理。

    youdao

  • This paper expounds two technique for intrusion detection: anomaly detection and misuse detection, and introduces the category and many intrusion detection techniques of IDS.

    检测入侵方法中的种方法——异常入侵检测误用入侵检测进行了描述,介绍两种方法中采用的各种不同的检测技术

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

  • The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测主要目标用于检测非授权误用以及系统内部外部的入侵行为。

    youdao

  • By constructing state machine and get information from it, this approach can contain both anomaly-based and misuse-based intrusion detection methods, and gain the better detection capability.

    通过构建状态其中提取出相关信息,不仅可以同时兼顾基于误用基于异常的两种检测方法而且使得它们获得更好的检测效果

    youdao

  • The data analysis integrates the two detection methods: anomaly and misuse, which provides corresponding detection models and introduces the noise filtering function.

    数据分析融合了异常检测误用检测两种方法提出相应的检测模型引入了函数

    youdao

  • The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.

    入侵检测系统(IDS)主要目标检测计算机系统内部外部入侵者非授权使用误用滥用

    youdao

  • The results show that malicious code using obfuscating transformation can be free of most of malicious code detecting tools who adopt the misuse intrusion detection.

    测试结果表明经过模糊变换恶意代码能够逃避大部分基于误用检测恶意代码对抗工具

    youdao

  • For reducing the false alarm, we adopt hierarchical alert classifier which combined misuse intrusion detection and anomaly intrusion detection.

    并且采取结合了不当行为异常行为侦测阶层式警报分类降低警报

    youdao

  • The neural network is trained and applied to misuse intrusion detection cases.

    混合网络进行训练后,将该网络用于滥用入侵检测。

    youdao

  • Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.

    然后分析入侵检测技术比较异常检测滥用检测各自优缺点,以及各种检测方法数据来源

    youdao

  • The two popular detection modes, Misuse mode and Anomaly mode, have been taken into the design of detection part of the Agent.

    系统在设计检测部分时,采用两种检测模式误用模式异常模式。

    youdao

  • This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    youdao

  • As an active intrusion detection security protection technology, intrusion detection provides internal attacks and external attacks and misuse of the real-time protection.

    入侵检测作为一种主动安全防护技术提供内部攻击外部攻击误操作实时保护。

    youdao

  • Absrtact: Invasion eigenvalue and discovery algorithm are the key technologies to misuse intrusion detection technology.

    摘要入侵特征值识别发现算法误用入侵检测中的关键技术

    youdao

  • In doing so, this provides a convenient means of managing and reacting to misuse using both types of intrusion detection.

    这样做得好处是,对于使用这两种类型的入侵检测可以提供简单管理降低误报的便利方式

    youdao

  • The intrusion detection system divides into two categories according to the detection technique: anomaly-based detection system and misuse-based detection system.

    入侵检测按照检测技术分为:基于异常的入侵检测基于误用的入侵检测。

    youdao

  • According to the differences of intrusion detection theory, it includes misuse-based detection and anomaly-based intrusion.

    根据入侵检测原理不同,入侵检测可分为误用检测和异常检测两种。

    youdao

  • Then misuse intrusion detection and anomaly intrusion detection of IDS's are represented .

    介绍入侵检测中的滥用检测异常检测。

    youdao

  • This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    youdao

  • This paper proposes an alarm filtering scheme to improve the efficiency of misuse-type network intrusion detection system.

    文中,针对误用网络型入侵检测系统建立一个警报过滤机制,该机制找出攻击成功时所需具备环境条件。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定