Chinese translation for "主机入侵检测"
|
- hids
Related Translations:
主机系统: main machine system 主机油: oil galleryoilgallery 主机数: machinery numbermachinery numeral
- Example Sentences:
| 1. | This model provides the ids interface for network and for hosts , which is foundation of the cooperation among different agents 该模型提供了基于网络和基于主机入侵检测部件的接口,为不同agent之间的相互协作提供了条件。 | | 2. | The improved hmm algorithm is applied in this hids . the test results indicate that the hids has a better detection rate and lower misinformation rate 对实现的主机入侵检测系统进行了测试,得到了较好的检测率和较低的误报率和漏报率。 | | 3. | An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf ) 参考通用入侵检测公共框架( cidf ) ,设计并实现了基于系统调用监控的linux主机入侵检测系统,在其中采用了hmm检测算法。 | | 4. | After carefully comparing various intrusion detection techniques , the research on hmm applied in hids is proposed , which is based on monitoring linux system calls 通过对各种入侵检测技术的分析和比较,确定了在linux系统中基于系统调用监控的主机入侵检测的方案。 | | 5. | Lastly , we give an advice on the limit of intrusion detection technology , such as the system ’ s analyzed ability can ’ t satisfy the requirement of the rapid development of net ’ s bandwidth 最后,我们指出了主机入侵检测技术的不足之处,例如入侵检测系统的分析能力不能满足网络带宽迅速发展的需求等。 | | 6. | Intrusive action or the illegal operation of possibly occurring is distinguished to the various states that the main engine intruding checkout system can monitor the main engine at real time , and voluntarily stops the illegal operation when intruding the action to occur , and the protection main engine system is not intruded 摘要主机入侵检测系统可以实时监测主机的各种状态,辨别可能发生的入侵行为或非法操作,在入侵行为发生的时候自动阻断非法操作,保护主机系统不受入侵。 | | 7. | At the part of design and implementation of that system we construct an intrusion detection system based on host by the technology of data mining , and this system can real - timely monitor statuses about processes , file system , cpu , memory , register and network of host and we uses the arithmetic about data mining to analyze data about them , as a result we get some rules which can be matched with rules in pattern warehouse 在系统的设计和实现部分,我们把数据挖掘技术运用到入侵检测系统中,构建了一个基于数据挖掘的主机入侵检测系统,可以实时地监控进程状态、文件系统状态、 cpu使用状态、内存使用状态、注册表的使用状况以及主机的网络状态,并运用了数据挖掘算法实时对它们进行分析,形成规则,以便与模式库里的规则进行匹配。 | | 8. | The paper at first introduces the background of the study on technology of intrusion detection , actuality of intrusion detection system , secondly , the history of development of that technology , the definition and function of intrusion detection , the foreground of intrusion detection system and the limit of the technology of intrusion detection are introduced , and then some basic definitions and arithmetic on data mining in which we emphasize the analyzing of associated rule are introduced . lastly , this paper introduces the design and implementation of a host intrusion system based on data mining and we get a summarization of this system and give an advice about prospect 本文首先介绍了入侵检测技术的研究背景、入侵检测系统的现状,接着介绍了入侵检测技术的发展历程、入侵检测的定义、入侵检测系统的功能以及发展前景和目前入侵检测技术的局限性,然后介绍了数据挖掘的一些基本概念和算法,重点介绍了关联规则分析法,最后介绍了一个基于数据挖掘的主机入侵检测系统的设计和实现,并对系统做了总结和展望。 | | 9. | At the very beginning , this paper introduces integral system work flow and intrusion detect technology and intrusion prevent technology relating to the topic . secondly the several parts of system design scheme and realization has been discussed : the system overall design , the system design scheme and realization of the network intrusion detect / prevent module , the system design scheme and realization of the host intrusion detect / prevent module , this paper brings forward a intrusion prevent system frameworks which combines inline - operation with exterior operation . the frameworks can provide complete protect environment for the system and improve the entire security 论文首先陈述了系统整体工作流程、入侵检测和入侵防御相关技术基础。接着按以下几个部分叙述了系统的整体功能和部分关键模块的设计过程和实现方法:整体模块设计,主机入侵检测、防御模块的设计和实现,边界入侵检测、防御模块的设计和实现过程。并提出了一个内嵌式互动技术和外联式互动技术结合的边界入侵检测、防御系统的模型,该模型针对不同攻击种类而对系统实现多方位的安全保护,提高了系统整体的安全性。 | | 10. | According to the security requirements of the unix host , in this article the information security technology of the unix host on a trusted environment is discussed . the security vulnerabilities , threats and risks for unix systems are analyzed . an unix host ' s security policy and an adaptive security management model are proposed 本文针对涉密局域网中unix主机的安全需求,重点研究“可信环境”下unix主机的信息安全防护理论和技术,分析了unix系统的安全漏洞、威胁及风险,设计了unix主机的安全保护策略,提出了主机可适应性安全管理模型,讨论了基于规则的访问控制、主机入侵检测、安全审计技术等。 |
- Similar Words:
- "主机前端" Chinese translation, "主机燃油单元" Chinese translation, "主机燃油供给泵" Chinese translation, "主机燃油加热器" Chinese translation, "主机燃油增压泵" Chinese translation, "主机入侵检测系统" Chinese translation, "主机软件版本" Chinese translation, "主机上的" Chinese translation, "主机设备" Chinese translation, "主机设计者" Chinese translation
|
|
|