Mobile
Log In Sign Up
Home > english-chinese > "attack detection" in Chinese

Chinese translation for "attack detection"

入侵检测

Related Translations:
detection efficeincy:  检波效率探测效率
attack jet:  战斗机
attack behavior:  攻击行为进攻行为
breathy attack:  呼吸音发作
reassembly attack:  重放攻击
body attack:  有氧操有氧健身操
attacking player:  攻击型先手攻击型选手4进攻型运动员
mating attack:  杀棋攻势
rear attack:  后半球攻击后方攻击
bacterial attack:  细菌腐蚀细菌侵袭
Example Sentences:
1.Dm can automatically extract the signatures and features without human interference . it can be used in unknown attack detection and decrease the dependence of es on the detection rule
而利用数据挖掘技术能够自动提取模式的特点进行异常检测,能够自动发现未知模式的入侵,降低了专家系统对知识库中规则的依赖性。
2.Two new kinds of detection - filtering mechanism are proposed in this paper . they are distributed attack detection - filtering mechanism ( dadf ) and local attack detection - filtering mechanism ( ladf )
在此基础上,本文提出了两种新的攻击检测?过滤机制,即:分布式攻击检测?过滤( dadf )机制和针对tcp洪流攻击的本地检测?过滤( ladf )机制。
3.There seem to be no substantial improvement in anti - ddos research on attack preventing , detecting & retorting yet , nor did any effective or nicety method appear to predict the ddos attack in time . ddos attack detection and defending is one of the frontiers in the field of network security
但是,目前全球对ddos攻击进行防范、检测和反击的研究工作没有实质性的重大突破,没有能准确及时预测ddos攻击发生的有效方法, ddos攻击的检测与防护是当前网络安全领域的重要前沿。
4.Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host . when a training sample set is unlabelled and unbalanced , attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it . when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification , a weighted svm algorithm , i
针对训练样本是未标定的不均衡数据集的情况,把攻击检测问题视为一个孤立点发现或样本密度估计问题,采用了超球面上的one - classsvm算法来处理这类问题;针对有标定的不均衡数据集对于数目较少的那类样本分类错误率较高的情况,引入了加权svm算法-双v - svm算法来进行异常检测;进一步,基于1998darpa入侵检测评估数据源,把两分类svm算法推广至多分类svm算法,并做了多分类svm算法性能比较实验。
5.In the face of the increasingly complicated threat of network environment , this paper focuses on the study of theories and key technologies of information security operation about network adversary , operation architecture , attack detection , attack prevention , attack deception and vulnerability analysis . the purpose of the researches is to explore new methods for information security assurance so that we can have the initiative on information security
而对日益复杂网络环境威胁,本文就网络敌手模型、对抗体系、攻击检测、攻击阻断、攻击欺骗以及脆弱性分析等信息安全对抗理论和关键技术进行研究。其目的在于探索新型的信息安伞保障方法,以掌握信息安全对抗主动权。
Similar Words:
"attack crew" Chinese translation, "attack cursor" Chinese translation, "attack curve" Chinese translation, "attack data" Chinese translation, "attack delay" Chinese translation, "attack diode" Chinese translation, "attack direction" Chinese translation, "attack director" Chinese translation, "attack display" Chinese translation, "attack doctrine" Chinese translation