The network anomaly detection system is made of three modules mainly: data collection module, anomaly judgement module and alert analyse module.
本文的网络异常监测系统主要分为三个模块:数据采集模块、异常判定模块和告警分析模块。
This article presents a anomaly detection method based on correlation eigen matrix and neural network.
本文描述了一个基于相关特征矩阵和神经网络的异常检测方法。
This article presents an anomaly detection method based on correlation eigen matrix and neural network.
文章描述了一个基于相关特征矩阵和神经网络的异常检测方法。
A network traffic anomaly detection mechanism is presented based on support vector machine (SVM).
提出了一种基于支持向量机的网络流量异常检测方法。
Anomaly detection based on network traffic model is one of the important research directions in traffic anomaly detection.
基于网络流量模型的异常检测是流量异常检测的一个重要研究方向。
A novel online fault detection algorithm based on adaptive auto-regressive (AAR) model is proposed focusing on the anomaly detection of network traffic.
通过研究网络流量异常检测,提出一种新的基于自适应自回归(aar)模型的在线故障检测算法。
But anomaly detection USES based-on statistic analyzed model detection "anomaly" network actions.
而异常检测模块,它采用基于统计分析模型检测“异常”的网络行为。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
Real-Time anomaly detection is a highlighted topic of network security research in recent years.
实时异常检测是目前网络安全的研究热点。
An anomaly detection model based on the multi-feature similarity in large-scale network is proposed in this paper.
提出了大规模网络中一种基于相似度的异常检测模型。
This paper focus on Anomaly-based Network Intrusion Detection System (ANIDS), which use two methods to design and implement anomaly detection .
ANIDS是基于异常检测技术的入侵检测系统,它从两个方面来实现异常检测。
On the aspect of network intrusion detection algorithm, the thesis studies the misuse detection algorithm and anomaly detection algorithm.
在网络入侵检测算法方面,本文对异常和误用检测算法进行了研究。
This paper presents a new method, which is active detect network scans, based on TCP's port and flag's anomaly detection.
提出一种基于TCP端口和标志位异常检测的主动检测扫描技术。
The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.
随着网络规模和速度的增加,大规模网络异常发现要求检测算法能够在无保留状态或者少保留状态下对G比特级的海量网络业务量数据进行实时在线分析。
The detection model outlined in this paper would be able to help the network managers to find the anomaly behavior, which has high practical value.
本文提出的网络行为检测模型可以有效地帮助网管人员及时发现网络中的异常行为,为网络管理人员提供便利,具有较强的实用价值。
Through the comparison of the results from the experiment and wavelet analysis, it shows that network-wide traffic anomaly detection based on subspace method is more simple and effective.
通过实验结果与小波分析结果的对比,证明了基于子空间方法的大规模网络流量异常检测是一种既简单又高效的方法。
It is always a difficult problem to erect a model of normal behaviors in the area of network traffic anomaly detection, a method of network intrusion detection.
流量异常检测,作为一种网络入侵检测的方法,存在着如何建立正常行为模型的难题。
This paper presents and implements a macro-network traffic anomaly detection strategy based on sequential frequent pattern mining.
基于序贯频繁模式挖掘,提出并实现了一种宏观网络流量异常检测的方法。
This paper presents a new method of network-wide traffic anomaly detection.
提出了基于信息熵的大规模网络流量异常检测方法。
Secondly, the anomaly detection model based on K-means algorithm and SOM network is constructed. It can classify the normal and abnormal network data stream so better to detect the unknown attack.
提出了一种k-均值聚类算法和SOM自组织神经网络算法相结合的异常检测模型,使得系统可以更好的分类正常数据流和异常数据流,以此来防范未知的攻击。
On the base of the characteristic of modes of anomaly-based and signature-based, a network invasion detection system is proposed to use the virtue of two modes to detect network invasion.
针对异常发现技术和模式匹配技术各有利弊的特点,设计了将这两种技术综合运用的网络入侵检测系统。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
应用推荐