您要查找的是不是:
- network intrusion monitoring 网络入侵监测
- Classify the datagram on LANs can provide some evidences of NID(network intrusion detect). 对数据报行为进行分类可为局域网上的网络入侵检测提供重要依据。
- Network Intrusion Detection System (NIDS) is becoming an increasingly important security measures. 网络入侵检测系统(NIDS)正在变成一个日益重要的安全措施。
- This is my graduation design. On the network intrusion detection system, I hope, we see! 这是本人毕业设计.;关于网络入侵检测系统的;希望大家看看!
- The performance efficiency of a network intrusion detection system(NIDS) is dominated by pattern matching algorithm. 网络入侵检测系统的效率取决于模式匹配算法选择。
- Regular expressions are widely used in Network Intrusion Detection System (NIDS) to represent attack patterns. 摘要:正规表示式在网路入侵侦测系统被广泛地使用来表示攻击的病毒码。
- The performance efficiency of a network intrusion detection system (NIDS) is dominated by pattern matching algorithm. 摘要网络入侵检测系统的效率取决于模式匹配算法选择。
- AD-NIDS, a new distributed network intrusion detection system based on agent, is constructed referring to CIDF(common intrusion detection framework) . 在分析了CIDF体系结构的基础上,构建了一个基于代理的分布式网络入侵检测系统AD-NIDS。
- Based upon open code software,combined with exchanger operation by Perl language,a solution on campus network intrusion detectoin with exchange cooperation was given. 介绍一种以开放源码软件为基础,结合Perl语言对交换机进行操作,实现入侵检测与交换机联动的解决方案。
- This clustering algorithm can deal with network intrusion detection from mass unlabeled data, distinguish between normal and abnormal data and detect unknown attacks. 该算法可实现对大规模无标识原始数据的入侵检测,区分正常和异常行为,并能检测到未知攻击。
- In this paper, a novel packet classification architecture called BV-TCAM is presented, which is implemented for an FPGA-based Network Intrusion Detection System (NIDS). 一个称为BV-TCAM的数据包分类体系,它是用来实现以FPGA为基础的网络入侵监测系统(NIDS)。
- On the base of requirement, combining with the ideas of software engineering, a dynamic network intrusion forensics process model based on evidence competency was explored. 在此基础上,结合软件工程的思想,从获取证据的需求出发,提出了一个基于入侵检测的网络证据获取过程模型。
- Referring to the newest Symantec Internet Security Threat Report, we found that network intrusion behaviors evolve into more hidden and target-specific behaviors. 参考最新的网路安全威胁报告,网路入侵行为正朝向隐密化与目标特定化而演进。
- Modern Network Intrusion Detection Systems (NIDS) inspect the network packet payload to check if it conforms to the security policies of the given network. 随着网络应用的日益推广和深入,网络安全的重要性日益显现,网络安全环境日益恶化和人们对网络安全要求的日益提高,基于软件方法不能满足网络中高速关键字搜索匹配的要求,因此出现了各种硬件或软硬件协同实现方法的研究。
- This is a C preparation network intrusion detection system, through command line commencement of the proceedings, through different parameters with the corresponding function! 这是一个用C编写网络入侵检测系统,通过命令行启动程序,通过不同参数调用相应的功能!
- The thesis analyses the construction of SELF set and the principle of the choosing of character code as well as its evolution. Using a model for network intrusion detection, it describees how to express the phenotype and genotype of a character code. 对人工免疫系统中SELF集的构造和特征码的选取、演化进行了分析,以网络入侵检测的AIS为例,对特征码的表现型和基因型做了详细描述。
- The research of this thesis is based on the wildly used open source antivirus software ClamAV. Most recent research of pattern matching hardware is targeted for Network Intrusion Detection System and Snort rules. 本文的研究基于广泛使用的开源防病毒软件ClamAV。 现有的模式匹配电路研究大多基于网络入侵检测和Snort规则库。
- In recent years, more and more attention is paid to the network security. Network intrusion detection and network vulnerability analysis are active solution for network security problems, and they are too much important. 网络安全问题越来越受到人们的重视,网络入侵检测和网络脆弱性分析是主动的网络安全解决方案,是解决这一问题的重要手段之一。
- The thesis presents a network security strategy, which is founded on firewall and IDS, for campus network that is based on open source code software. The strategy is implemented with the support of snort NIDS, a famous network intrusion detection system. 文章提出了在使用基于开放源代码软件的校园网环境中使用防火墙+入侵检测系统的校园网网络安全策略,并用著名的网络入侵检测系统snort NIDS加以实现。
- Then, through the invasion of testing technology and related CIDF standard in-depth study in a laboratory environment for network intrusion detection systems based on the operating system platform in the windows, using a MySQL database. 然后,通过对入侵检测技术和相关CIDF标准的深入研究,在实验环境下实现了一个基于网络的入侵检测系统,该系统运行在windows平台上,采用了MySQL数据库。