In this article we will find out the frangibility of technology of Intrusion Detection and analyze the frangibility.
本文主要通过对入侵检测技术的研究,分析其脆弱性。
According to the idea mentioned above, this paper makes a deep analysis on the technology of intrusion detection and the intrusion detection based on system calls.
根据这种思想,论文对入侵检测和基于系统调用的入侵检测技术进行了深入分析和讨论。
First, the article analyzes the current principle, classification and the technology of Intrusion Detection in common use and predicates the direction of Intrusion Detection development.
首先,本文分析了通用的入侵检测原理、分类及常用的入侵检测技术,指出了入侵检测的发展趋势。
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
In the part of interface technology, author analyzes how to design interface to realize the intrusion detection and feed back the dynamic policies of content filter subsystem.
在接口设计部分,分析了如何设计接口实现入侵检测和内容过滤系统的动态规则反馈。
Information security problem is one of the key problems in modern Internet. by active defending feature intrusion detection technology is widely recognized and applied.
在信息安全问题日益突出的互联网中,入侵检测技术以其主动防御的特性,得到越来越广泛的重视和应用。
Mobile Agent Based Intrusion Detection System (MABIDS) is one sub-subject of "Network Attack and Defense Technology", a national fundamental research project.
“移动代理在入侵检测中的应用”是国家基础研究项目《网络攻防技术》的子课题内容之一。
In the process of studying intrusion detection technology, the vulnerability taxonomy is an important and necessary process.
在进行入侵检测技术的研究中,安全漏洞分类是一个重要和必需的过程。
Intrusion Detection technology is an important component of P2DR model.
入侵检测技术是P 2dr模型的重要组成部分。
It introduces the design methods of the adaptive intrusion detection system, and it also analyzes the information process flow, the software design principle, and some key technology problems.
阐明了自适应入侵检测系统的设计方法,着重分析了该系统的信息处理流程、软件设计原则、及关键技术问题。
This text has firstly introduces the classification of the intrusion detection system, the current research circumstance, the trend of development and the technology used mostly.
本文首先介绍了入侵检测系统的分类,当前的研究现状,以及使用的主要技术和发展趋势。
Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.
由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
This paper introduces the concept of intrusion detection technology, classifications and general model, and analyzes the weaknesses and limitations of intrusion detection System.
文章介绍了入侵检测技术的概念、分类和通用入侵检测模型,并分析了入侵检测系统的弱点和局限性。
With the rapid development of network technology, Intrusion detection has become a highlighted topic of network security.
随着网络技术的飞速发展,入侵检测技术已成为网络安全关注的热点。
Intrusion detection technology is an active security defensive technology that can overcome the shortcomings of traditional security technology.
入侵检测技术是一种主动防御型安全技术,可以弥补传统安全技术的不足。
On principle, Intrusion detection technology is made up of abnormal detection and musing detection and by the detected content, it includes host detection and network detection.
入侵检测技术从原理上分为异常检测和误用检测,从检测内容上分为主机入侵检测和网络入侵检测技术。
Then it analyzed intrusion detection technology, compared the merits and shortcomings of Anomaly-based detection and Misuse-based detection, and depicted the source data of different detection ways.
然后分析入侵检测技术。比较异常检测和滥用检测各自的优缺点,以及各种检测方法的数据来源。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
Besides, it builds up a designed model to alarm at unknown intrusion detection, which to some extends, improves the disadvantage of module matching technology.
并且在检测未知入侵行为方面,构建了一个预想模型,对未知入侵行为做了预警,一定程度上改善了模式匹配技术本身的弱点。
This paper first introduces the actuality of network security, intrusion detection technology and CORBA, then puts foward the structure of a distributed intrusion detection system based on CORBA.
本文首先简要介绍网络安全现状、入侵检测技术和CORBA 技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。
Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.
入侵检测技术是对原有计算机网络安全机制的合理补充,它的应用极大地扩展了网络和系统安全的防御纵深。
Intrusion detection technology is one of the hot spots in the information security areas as the important means to insure the computer network information security.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.
针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。
Intrusion detection and prevention systems have become an essential technology in the deployment of a "defense-in-depth" security architecture.
入侵检测和防护系统已经成为部署“深度防护”安全体系结构的一种基本技术。
Database intrusion detection technology is an important part of database security.
数据库入侵检测技术是数据库安全的重要组成部分。
Aiming at shortcomings of the present technologies, this paper offers a new intrusion-detection technology which is based on sequence of characteristic information syntax analysis.
针对滥用类入侵检测技术存在的不足,提出了基于特征信息序列语法分析的入侵检测技术。
Intrusion detection technology is the core technology security audit is one of the important network security components.
入侵检测技术是安全审计中的核心技术之一,是网络安全防护的重要组成部分。
Intrusion detection technology which is a pro-active protection of network resources, in recent years, has been extensive research and application.
入侵检测技术是一种主动保护网络资源的网络安全技术,近年来得到了广泛的研究与应用。
Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.
入侵容忍技术是继信息保护技术和入侵检测、容错技术之后的第三代网络安全的核心。
Intrusion tolerant technology is the core of the third generation of network security in back of information protection, intrusion detection and fault tolerance technology.
入侵容忍技术是继信息保护技术和入侵检测、容错技术之后的第三代网络安全的核心。
应用推荐