A new anomaly detection model based on system call macro was presented.
提出了一个基于系统调用宏的异常检测模型。
But, it is limited to use anomaly detection and misuse detection in practice.
但是在实际中的应用仍然局限于异常检测和误用检测。
This paper presents a new algorithm , an anomaly detection algorithm based on hidden pattern.
该文提供了一种新的基于隐含模式的异常检测算法。
Describing normal behaviors is one of the difficulties that an anomaly detection system faces.
对正常行为的描述是异常检测系统必须要解决好的核心问题之一。
A network traffic anomaly detection mechanism is presented based on support vector machine (SVM).
提出了一种基于支持向量机的网络流量异常检测方法。
But anomaly detection USES based-on statistic analyzed model detection "anomaly" network actions.
而异常检测模块,它采用基于统计分析模型检测“异常”的网络行为。
This system has three functions: misused detection, anomaly detection, and attack source traceback.
该系统实现了误用检测、异常检测、攻击源追踪三个方面的功能。
This paper presents a new method based on TCP packet anomaly detection (THAD) to detect system scans.
该文提出一种基于TCP包头异常检测的系统扫描检测方法THAD。
In this paper, a new method of hyperspectral anomaly detection based on project pursuit is presented.
该文提出了一种基于投影追踪的高光谱图像异常点检测方法。
This article presents a anomaly detection method based on correlation eigen matrix and neural network.
本文描述了一个基于相关特征矩阵和神经网络的异常检测方法。
This article presents an anomaly detection method based on correlation eigen matrix and neural network.
文章描述了一个基于相关特征矩阵和神经网络的异常检测方法。
A matching algorithm based on the negative selection for anomaly detection was presented in this paper.
使用了一种改进的否定选择匹配算法来检测异常行为。
Mining audit trails to derive the normal user profiles is the common method adapted by anomaly detection.
挖掘系统审计记录构造用户的行为轮廓,是异常检测的常见方法。
Currently, misuse detection is comparatively mature but there are still many problems about anomaly detection.
目前,滥用检测技术已经相对成熟,而异常检测还存在大量问题难以解决。
At another level, anomaly detection can investigate user patterns, such as profiling the programs executed daily.
另外,异常检测能够分析用户的(行为)模式,作为一个程序每天都要执行的。
An anomaly detection model based on the multi-feature similarity in large-scale network is proposed in this paper.
提出了大规模网络中一种基于相似度的异常检测模型。
This module incorporate system call anomaly detection modeling methods and monitor file systems and Registry accesses.
该模块是以系统调用检测为核心并且结合文件监控和注册表监控功能。
The results of the experiment show that the anomaly detection method based on principal component analysis is effective.
实验结果证明了基于主成分分析的异常检测方法的有效性。
The goal of the design of the anomaly detection algorithm is to enhance the efficiency and the veracity of the detection.
异常检测算法的设计目标是提高检测的效率和准确性。
This paper presents a new method, which is active detect network scans, based on TCP's port and flag's anomaly detection.
提出一种基于TCP端口和标志位异常检测的主动检测扫描技术。
Anomaly detection based on network traffic model is one of the important research directions in traffic anomaly detection.
基于网络流量模型的异常检测是流量异常检测的一个重要研究方向。
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
The current intrusion detection techniques mainly include rule-based misuse detection and statistics-based anomaly detection.
当前的入侵检测技术主要有基于规则的误用检测和基于统计的异常检测。
An anomaly detection algorithm is presented based on improved KFCM cluster algorithm which can achieve partial best partition.
提出了一种改进的KFCM聚类异常检测算法,该算法可获得局部最优划分。
Designing tests that match salient characteristics of test data to the anomaly detection products being tested means more work.
设计一些测试,让测试数据的突出特点与进行测试的异常检测产品相匹配,需要做很多工作。
This paper presents and implements a macro-network traffic anomaly detection strategy based on sequential frequent pattern mining.
基于序贯频繁模式挖掘,提出并实现了一种宏观网络流量异常检测的方法。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
Based on the analysis of characteristics of hyperspectral imagery, the methods of anomaly detection are studied systematically in this paper.
本文在深入分析高光谱数据特点的基础上,系统地研究了基于光谱维的图像异常检测方法。
Data Mining Technology, a tool that can discover information and knowledge in large data set, is used many fields, including anomaly detection.
数据挖掘是帮助人们在海量数据中发现信息和知识的工具,广泛应用到各个领域,包括异常检测。
The network anomaly detection system is made of three modules mainly: data collection module, anomaly judgement module and alert analyse module.
本文的网络异常监测系统主要分为三个模块:数据采集模块、异常判定模块和告警分析模块。
应用推荐