There are many intrusion detection systems deployed in parts of the world.
不少著名的入侵检测系统也得到广泛的实际应用。
Analyzed and compared the typical intrusion detection systems and intrusion means.
对典型的入侵检测系统和入侵方式进行了分析与比较。
Intrusion detection (ID) techniques are important to intrusion detection systems (IDS).
入侵检测技术是入侵检测系统(IDS)的重要内容。
Traditionally, intrusion detection systems detect intrusions at the operating system(OS)level.
传统的入侵检测系统方法是在操作系统级检测入侵。
Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。
In the intrusion detection systems, matching speed of the string matching algorithm is very important.
入侵检测系统当中,匹配算法运行的速度是至关重要的。
Intrusion detection systems, or IDSs, have become an important component in the Security Officer's toolbox.
入侵检测系统,简称IDS,已经成为了安全办公产品中的一个重要的组成部分。
Anomaly detection ACTS as one of the important directions of research on Intrusion detection Systems (IDSs).
异常检测是目前入侵检测系统(IDS)研究的主要方向。
Distributed intrusion detection systems( DIDS) have many advantages such as scalability, subversion resistance.
分布式入侵检测系统有许多优点,如可测量性和抗破坏性。
Therefore, research on collaboration between honeypot and intrusion detection systems is a problem worthy of study.
因此,蜜罐与入侵检测系统之间的协作是一个非常值得研究的问题。
Adaptive model is a detecting model which is automatically built of intrusion detection systems based on data-mining.
适应性模型是一种自动建立的基于数据挖掘的入侵检测系统检测模型。
Anomaly detection techniques are seldom employed in the leading commercial intrusion detection systems for its own fake.
异常检测由于自身的原因很难在商业入侵检测系统中得到应用。
The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.
作者很快得出了两个重要的主题:入侵检测系统,IDS,和旁路过滤。
As the second line of defense for computer and network systems, intrusion detection systems (IDSs) have been deployed increasingly wider.
作为保护计算机和网络系统的第二道防线,入侵检测系统的应用的越来越广泛。
This mechanism has a perfect scalability and is well fitted to the characteristic of large-scale distributed intrusion detection systems.
文中提出的数据融合机制具有很好的扩展性,非常适合大规模分布式网络环境的特点。
Based on the framework of network intrusion detection systems based on data mining, this paper devises an analyzer model of unsupervised learning.
本文在基于数据挖掘的网络入侵检测系统框架基础上设计了一个无导师学习的分析器模型。
Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks.
现存的入侵检测系统缺乏从先前所观测到的进攻进行概括并检测已知攻击的细微变化的能力。
As one of the important points of information security safeguard system, more and more intrusion detection systems have been used to protect networks.
入侵检测系统作为信息安全保障体系中不可或缺的重要环节,被更多地用于安全防护。
The integrity of digital evidences was protected by integrity algorithm, which was collected and stored from intrusion detection systems and host systems.
该系统从入侵检测系统和主机系统等多数据源主动收集数字证据,通过完整性算法保证数字证据传输和存贮过程中的完整性。
In addition, CSC will plan, coordinate, analyze and report on the results of managed network intrusion detection systems and intrusion prevention systems.
此外,CSC公司将规划、协调、分析和报告网络入侵检测系统和入侵防御系统管理的结果。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Based on D-S evidence theory in data fusion technology, this paper applies it to distributed intrusion detection systems and gives a network intrusion early warning model.
本文以数据融合技术中的D -S证据理论为基础,将其运用于分布式入侵检测系统中,提出了基于D - S证据理论的网络入侵预警模型。
With the frequent occurrences of network oriented intrusion, intrusion detection systems(IDS)have gained more and more recognition and application in network environments.
随着网络入侵事件的日益增多,入侵检测系统(IDS)越来越广泛地应用在网络环境中。
In the artificial immune based intrusion detection systems, mature detectors complete the tolerance and generation process mainly by negative selection algorithm currently.
目前在基于人工免疫的入侵检测系统中,成熟检测器的耐受和生成过程主要采用否定选择算法实现。
This paper first analyses the characteristic of the host -based and network -based intrusion detection systems, then presents an audit system for electronic commerce system.
该文在分析基于主机和基于网络的入侵检测系统的特点的基础上,提出了一种电子商务安全审计系统的设计。
After discussing the present intrusion detection systems and methods and analyzing their defects, the author presented SNMP agent system based on intrusion status detection.
在分析现有入侵检测方法及其缺陷的基础上,提出了一种基于状态机的入侵检测的SNMP代理方案。
Intrusion detection systems constantly monitor sensitive operating system and browser areas, alerting you with clear information the instant suspicious activity is detected.
入侵检测系统持续监测敏感的操作系统和浏览器领域,警戒明确的信息的即时发现可疑活动你。
A few useful mechanisms of biological immune system are applied for intrusion detection systems, which makes it possible to initiatively defense a variety of network attacks.
机体免疫系统的许多有益特性被应用于入侵检测系统,使之能够主动地防御各种各样的网络攻击。
The dataset evaluation methodology is a feasible and effective way to evaluate the performance of intrusion detection systems. The dataset contains background traffic and attack traffic.
利用评测数据集对入侵检测系统进行评测是目前可行并且有效的评估手段,数据集包括背景流量和攻击流量两部分。
With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems (IDS) can't any longer meet the need of security.
随着网络攻击手段的日益复杂化、多样化和自动化,传统的入侵检测系统(IDS)己不能满足安全需求。
应用推荐