• Packet capture is the key technology of intrusion detection system and network security audit.

    网络数据包捕获技术实现入侵检测网络安全审计关键技术

    youdao

  • In this article we will find out the frangibility of technology of Intrusion Detection and analyze the frangibility.

    本文主要通过入侵检测技术研究,分析脆弱性

    youdao

  • According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.

    根据这种思想论文入侵检测基于系统调用入侵检测技术进行了深入分析和讨论。

    youdao

  • First, the article analyzes the current principle, classification and the technology of Intrusion Detection in common use and predicates the direction of Intrusion Detection development.

    首先本文分析了通用入侵检测原理分类常用的入侵检测技术,指出入侵检测的发展趋势

    youdao

  • At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.

    目前入侵检测技术研究重点集中在无需指导异常检测上。

    youdao

  • In the part of interface technology, author analyzes how to design interface to realize the intrusion detection and feed back the dynamic policies of content filter subsystem.

    接口设计部分分析了如何设计接口实现入侵检测内容过滤系统动态规则反馈

    youdao

  • Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.

    信息安全问题日益突出互联网中,入侵检测技术以其主动防御特性,得到越来越广泛的重视和应用。

    youdao

  • Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.

    移动代理在入侵检测中的应用”国家基础研究项目网络攻防技术子课题内容之一

    youdao

  • Intrusion Detection System is the next generation of dynamic security technology.

    入侵检测系统一代动态安全防范技术。

    youdao

  • In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.

    进行入侵检测技术研究安全漏洞分类一个重要必需的过程。

    youdao

  • Intrusion Detection technology is an important component of P2DR model.

    入侵检测技术P 2dr模型重要组成部分

    youdao

  • It introduces the design methods of the adaptive intrusion detection system, and it also analyzes the information process flow, the software design principle, and some key technology problems.

    阐明适应入侵检测系统设计方法着重分析了系统的信息处理流程软件设计原则关键技术问题。

    youdao

  • This text has firstly introduces the classification of the intrusion detection system, the current research circumstance, the trend of development and the technology used mostly.

    本文首先介绍了入侵检测系统分类当前研究现状,以及使用主要技术发展趋势

    youdao

  • Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.

    由于当前基于主机入侵检测系统局限性使得基于代理入侵检测技术显得日益重要

    youdao

  • This paper introduces the concept of intrusion detection technology, classifications and general model, and analyzes the weaknesses and limitations of intrusion detection System.

    文章介绍了入侵检测技术概念分类通用入侵检测模型分析了入侵检测系统弱点局限性

    youdao

  • With the rapid development of network technology, Intrusion detection has become a highlighted topic of network security.

    随着网络技术飞速发展入侵检测技术成为网络安全关注的热点

    youdao

  • Intrusion detection technology is an active security defensive technology that can overcome the shortcomings of traditional security technology.

    入侵检测技术一种主动防御型安全技术,可以弥补传统安全技术不足

    youdao

  • On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.

    入侵检测技术原理分为异常检测误用检测,检测内容分为主机入侵检测和网络入侵检测技术。

    youdao

  • Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.

    然后分析入侵检测技术比较异常检测滥用检测各自优缺点,以及各种检测方法数据来源

    youdao

  • The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.

    本文中所设计网络安全监测模型当今流行入侵检测技术主要方法采用实时基于NIDS的技术。

    youdao

  • Besides, it builds up a designed model to alarm at unknown intrusion detection, which to some extends, improves the disadvantage of module matching technology.

    并且检测未知入侵行为方面,构建一个预想模型未知入侵行为做了预警一定程度改善模式匹配技术本身弱点

    youdao

  • This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.

    本文首先简要介绍网络安全现状入侵检测技术CORBA 技术,然后给出应用CORBA建立分布式入侵监测系统体系结构

    youdao

  • Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.

    入侵检测技术原有计算机网络安全机制合理补充应用极大地扩展了网络系统安全的防御纵深。

    youdao

  • Intrusion detection technology is one of the hot spots in the information security areas as the important means to insure the computer network information security.

    入侵检测技术作为确保计算机网络信息安全重要手段正成为信息安全领域研究热点之一。

    youdao

  • To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.

    针对现存入侵检测技术不足提出了一个基于贝叶斯网络混合式智能入侵检测模型。

    youdao

  • Intrusion detection and prevention systems have become an essential technology in the deployment of a "defense-in-depth" security architecture.

    入侵检测防护系统已经成为部署“深度防护安全体系结构基本技术

    youdao

  • Database intrusion detection technology is an important part of database security.

    数据库入侵检测技术数据库安全重要组成部分

    youdao

  • Aiming at shortcomings of the present technologies, this paper offers a new intrusion-detection technology which is based on sequence of characteristic information syntax analysis.

    针对滥用类入侵检测技术存在不足提出基于特征信息序列语法分析的入侵检测技术

    youdao

  • Intrusion detection technology is the core technology security audit is one of the important network security components.

    入侵检测技术安全审计中的核心技术之一,是网络安全防护重要组成部分

    youdao

  • Intrusion detection technology is the core technology security audit is one of the important network security components.

    入侵检测技术安全审计中的核心技术之一,是网络安全防护重要组成部分

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定