繁體版 English
登录 注册

入侵检测模型

"入侵检测模型"的翻译和解释

例句与用法

  • With development of data mining and machine learning theory , adaptive ids model is developed from large audit data . its research is the work of academic and practicable significance
    数据挖掘技术的出现和机器学习理论的发展提供解决这个问题的有效的手段,我们可以从网络海量数据开发出自适应的入侵检测模型,它的研究具有重大的理论意义和实用价值。
  • The consistently repeated system call sequences in normal process trace were regarded as macros , and then an anomaly detection model based on system call macros markov chain was created
    把正常程序行为产生的系统调用迹中大量有规律的重复出现的系统调用短序列看成一个个独立的基本单位(宏) ,并以宏为基本单位构建一个基于马尔可夫链的异常入侵检测模型
  • Presently , the false alarm rate of most idss is high and their efficiency is low . aimed at these drawbacks of present idss , researches on ids models and neural network - based intrusion detection are presented in this paper
    目前大多数入侵检测系统误警率较高,效率较低,为克服现有ids的不足,本文从入侵检测模型、神经网络应用于入侵检测等方面进行了研究。
  • Flowing and precipitation of the self - purification is applied in the intrusion detection for optimizing the detection model and eliminating the latent intrusion data . by making fitness function , model self - purifying is realized
    根据水体自净的思想中的水体流动和沉淀的机理应用到入侵检测算法当中,实现了入侵检测模型的优化,剔除了模型中潜在的入侵数据。
  • This thesis describes a method of building model for intrusion detection that is based on intelligent agent technology . it combines agent technology with data mining technology . the agents of the system cooperate one another
    本文介绍了一种基于智能代理技术建立入侵检测模型的方法,该方法的思想是将代理技术和数据挖掘技术结合起来,在结构上采用代理技术,而在内容上采用数据挖掘技术。
  • Intrusion detection technology is analyzed and explored , and an agent - based distributed intrusion detection model is presented in this thesis . based on this model , an agent - based distributed intrusion detection system called a _ dids is developed
    本文对入侵检测技术进行了分析和研究,提出了一个基于agent的分布式入侵检测模型,并在此模型的基础上实现了一个基于agent的分布式入侵检测系统a _ dids 。
  • The main work is as follow : in chapter 2 , the magnitude of network audit dates is great . audit data contain a great deal of redundancy . the cost of making training data is high and difficult to achieve , it is one of the problems to be solved by data mining
    这是论文重点部分,主要有以下内容:第二章:网络侦听审计数据极其丰富,包括大量冗余信息,获得生成入侵检测模型代价过高,且难以完成,是数据挖掘要解决问题。
  • After twenty more years " evolution , misuse detection technology is used in intrusion detection system more maturely . in another aspect , however , because of its own shortage , anomaly detection technology is rarely used in the leading commercial intrusion detection system
    误用检测技术在经历了二十余年的发展之后,越来越成熟地运用到入侵检测系统中,但是异常检测由于其自身的原因,却很少在商用的入侵检测模型中应用。
  • Intrusion detection is an effective approach to dealing with the problem of network security . one of the research emphases in the field of intrusion detection is how to analyse the received data to build a intrusion detection model with effectiveness ^ adaptability and extensibility
    入侵检测是提高网络安全性的有效手段,该领域的研究重点之一是如何在收集到系统和网络的原始数据后,建立具有有效性、自适应性和可扩展性的入侵检测模型
  • 更多例句:  1  2  3  4  5
用"入侵检测模型"造句  
英语→汉语 汉语→英语