• The network anomaly detection system is made of three modules mainly: data collection module, anomaly judgement module and alert analyse module.

    本文的网络异常监测系统主要分为三个模块数据采集模块、异常判定模块告警分析模块。

    youdao

  • This article presents a anomaly detection method based on correlation eigen matrix and neural network.

    本文描述了一个基于相关特征矩阵神经网络异常检测方法

    youdao

  • This article presents an anomaly detection method based on correlation eigen matrix and neural network.

    文章描述了一个基于相关特征矩阵神经网络异常检测方法

    youdao

  • A network traffic anomaly detection mechanism is presented based on support vector machine (SVM).

    提出基于支持向量机的网络流量异常检测方法。

    youdao

  • Anomaly detection based on network traffic model is one of the important research directions in traffic anomaly detection.

    基于网络流量模型异常检测流量异常检测的一个重要研究方向

    youdao

  • A novel online fault detection algorithm based on adaptive auto-regressive (AAR) model is proposed focusing on the anomaly detection of network traffic.

    通过研究网络流量异常检测提出一种新的基于自适应自回归(aar)模型在线故障检测算法

    youdao

  • But anomaly detection USES based-on statistic analyzed model detection "anomaly" network actions.

    异常检测模块,它采用基于统计分析模型检测“异常”的网络行为。

    youdao

  • This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.

    系统模型综合了基于异常行为的入侵检测基于特征入侵检测技术配置采用主机配置网络配置相互配合的方式。

    youdao

  • Real-Time anomaly detection is a highlighted topic of network security research in recent years.

    实时异常检测目前网络安全研究热点

    youdao

  • An anomaly detection model based on the multi-feature similarity in large-scale network is proposed in this paper.

    提出大规模网络中一种基于相似度异常检测模型

    youdao

  • This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .

    ANIDS是基于异常检测技术的入侵检测系统两个方面实现异常检测。

    youdao

  • On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.

    网络入侵检测算法方面本文异常误用检测算法进行了研究

    youdao

  • This paper presents a new method, which is active detect network scans, based on TCP's port and flag's anomaly detection.

    提出一种基于TCP端口标志位异常检测主动检测扫描技术。

    youdao

  • The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.

    随着网络规模速度增加,大规模网络异常发现要求检测算法能够无保留状态或者少保留状态下G比特级海量网络业务量数据进行实时在线分析

    youdao

  • The detection model outlined in this paper would be able to help the network managers to find the anomaly behavior, which has high practical value.

    本文提出的网络行为检测模型可以有效帮助网管人员及时发现网络中的异常行为,为网络管理人员提供便利,具有的实用价值。

    youdao

  • Through the comparison of the results from the experiment and wavelet analysis, it shows that network-wide traffic anomaly detection based on subspace method is more simple and effective.

    通过实验结果小波分析结果对比证明基于子空间方法大规模网络流量异常检测一种简单高效的方法。

    youdao

  • It is always a difficult problem to erect a model of normal behaviors in the area of network traffic anomaly detection, a method of network intrusion detection.

    流量异常检测,作为一种网络入侵检测方法,存在着如何建立正常行为模型难题

    youdao

  • This paper presents and implements a macro-network traffic anomaly detection strategy based on sequential frequent pattern mining.

    基于序贯频繁模式挖掘提出实现了一种宏观网络流量异常检测方法

    youdao

  • This paper presents a new method of network-wide traffic anomaly detection.

    提出了基于信息熵大规模网络流量异常检测方法

    youdao

  • Secondly, the anomaly detection model based on K-means algorithm and SOM network is constructed. It can classify the normal and abnormal network data stream so better to detect the unknown attack.

    提出了一种k-均值聚类算法SOM自组织神经网络算法相结合异常检测模型,使得系统可以更好分类正常数据异常数据流,以此来防范未知的攻击。

    youdao

  • On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.

    针对异常发现技术模式匹配技术各有利弊特点,设计了种技术综合运用网络入侵检测系统

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

  • The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.

    入侵检测分析技术主要分为滥用入侵检测异常入侵检测,目前国内外流行的网络入侵检测系统大都采用滥用入侵检测技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定