• A new anomaly detection model based on system call macro was presented.

    提出基于系统调用异常检测模型

    youdao

  • A new two-layer Markov chains anomaly detection model that operated on system call traces was presented.

    提出了一个两层马尔可夫异常入侵检测模型

    youdao

  • An anomaly detection model based on the multi-feature similarity in large-scale network is proposed in this paper.

    提出大规模网络中一种基于相似度异常检测模型

    youdao

  • On the basis of the current single layer Markov chain anomaly detection model, this paper proposes a new two-layer model.

    现有单层马尔科夫异常检测模型基础提出一种崭新的两层模型。

    youdao

  • Anomaly detection model first summarizes the signatures normal operations which should have to educe models of normal operations, and then monitors the subsequent operations.

    异常检测模型首先总结正常操作应该具有特征得出正常操作模型后续的操作进行监视,一旦发现偏离正常统计学意义上的操作模式,即进行报警。

    youdao

  • This paper introduces an user behavior anomaly detection model based on machine learning originated mainly by Terran Lane. Then it presents an improved anomaly detection model.

    该文对种基于机器学习用户行为异常检测模型进行描述,在此基础提出一种改进的检测模型。

    youdao

  • Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测的关键

    youdao

  • Secondly, the anomaly detection model based on K-means algorithm and SOM network is constructed. It can classify the normal and abnormal network data stream so better to detect the unknown attack.

    提出了一种k-均值聚类算法SOM自组织神经网络算法相结合异常检测模型,使得系统可以更好分类正常数据异常数据流,以此来防范未知的攻击。

    youdao

  • To the problems higher rate of false retrieval in anomaly detection system due to the uncertainty of intrusion, this paper presents an Anomaly Detection Model Based on Q- Learning Algorithm (QLADM).

    针对网络入侵确定性导致异常检测系统较高不足提出一种基于Q-学习算法的异常检测模型(QLADM)。 该模型把Q-学习、行为意图跟踪和入侵预测结合起来,可获得未知入侵行为的检测和响应。

    youdao

  • The general situation and running mechanism of danger theory are presented in this paper. After that we present an anomaly detection model based on danger theory, describe an interrelated algorithm.

    阐述危险模式概况运行机制,提出了一种基于危险模式的异常检测模型以及相关的算法。

    youdao

  • This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    youdao

  • Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.

    给出了针对无线网络入侵检测模型网络异常行为检测策略

    youdao

  • It detect the anomaly mainly through establishing the normal behavior model database that anomaly detection method based on the procedure behavior.

    基于程序行为异常检测方法主要通过建立程序正常行为模式检测入侵。

    youdao

  • A new method for the anomaly detection based on the attributes similarity and the cloud model was proposed to alleviate the high false positive rate problem in the detection.

    针对网络异常检测偏高的问题,提出了一种基于属性相似度模型的网络异常检测方法

    youdao

  • Anomaly detection based on network traffic model is one of the important research directions in traffic anomaly detection.

    基于网络流量模型异常检测流量异常检测的一个重要研究方向

    youdao

  • A novel online fault detection algorithm based on adaptive auto-regressive (AAR) model is proposed focusing on the anomaly detection of network traffic.

    通过研究网络流量异常检测提出一种新的基于自适应自回归(aar)模型在线故障检测算法

    youdao

  • But anomaly detection USES based-on statistic analyzed model detection "anomaly" network actions.

    异常检测模块,它采用基于统计分析模型检测“异常”的网络行为。

    youdao

  • The detection model outlined in this paper would be able to help the network managers to find the anomaly behavior, which has high practical value.

    本文提出的网络行为检测模型可以有效帮助网管人员及时发现网络中的异常行为,为网络管理人员提供便利,具有的实用价值。

    youdao

  • It is always a difficult problem to erect a model of normal behaviors in the area of network traffic anomaly detection, a method of network intrusion detection.

    流量异常检测,作为一种网络入侵检测方法,存在着如何建立正常行为模型难题

    youdao

  • An Email flow anomaly detection method based on leaky integrate-and-fire model was presented for detecting flow anomaly in the process of mail worm propagation.

    提出一种基于带泄漏积分触发测量方法的电予邮件蠕虫异常检测方法用来检测邮件蠕虫传播过程中的流量异常。

    youdao

  • This paper proposes a circular spatial correlation model, which is more suitable for the application of WSN in anomaly detection.

    本文随后提出了一种适合无线传感器网络异常事件监测应用环状空间相关性模型

    youdao

  • This paper proposes a circular spatial correlation model, which is more suitable for the application of WSN in anomaly detection.

    本文随后提出了一种适合无线传感器网络异常事件监测应用环状空间相关性模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定