入侵监测

  • 网络Intrusion detection;IDS
入侵监测入侵监测
  1. 系统调用是入侵监测系统的一种非常有效的输入,我们可以使用一种模型描述系统调用的序列关系,从而进行异常入侵检测。

    The system call is an effective input for the IDS , we can use it to set up a model to describe the program for anomaly detection .

  2. FPGA技术已经被广泛用于实时网络入侵监测。

    FPGA technology has become widely used for real-time network intrusion detection .

  3. 应用GIS进行外来树种生物入侵监测与早期预警

    Application of GIS in Monitoring and Early Warning of Bio-invasion of Exotic Trees

  4. NET框架下实现了该入侵监测系统。

    NET , the frame of .

  5. 使用FPGA进行网络入侵监测

    Efficient Packet Classification for Network Intrusion Detection using FPGA

  6. 基于CORBA技术的分布式入侵监测系统模型

    A model of Distributed Intrusion Detection System Based on technology of CORBA

  7. CPN在移动代理网络入侵监测技术中的应用

    The Application of CPN-based Mobile Agent Intrusion Detection System

  8. 首次提出了一种基于纤维增强塑料(FRP)传感光缆的新型高灵敏相位敏感光时域反射计(Φ-OTDR)分布式光纤入侵监测系统。

    A novel Φ - OTDR distributed optical fiber intrusion monitoring system based on fiber reinforced plastic ( FRP ) encapsulated fiber cable is reported and demonstrated for the first time to our knowledge .

  9. 一个称为BV-TCAM的数据包分类体系,它是用来实现以FPGA为基础的网络入侵监测系统(NIDS)。

    In this paper , a novel packet classification architecture called BV-TCAM is presented , which is implemented for an FPGA-based Network Intrusion Detection System ( NIDS ) .

  10. 基于代理的分布式入侵监测系统中网络代理的设计与实现

    The design and realization of network agent in agent-based distributed intrusion detection system

  11. 水化学与电法在海水入侵监测中的应用

    The application of hydrochemical and electrical quantified indices in the monitoring of seawater encroachment

  12. 潍河下游平原咸水入侵监测研究

    A Study on Dynamic Monitoring of Saltwater Intrusion on Lower Reaches of Weihe River

  13. 新型高灵敏分布式光纤入侵监测系统

    Highly sensitive distributed optical fiber intrusion monitoring system

  14. 分布式入侵监测中负载平衡实现策略研究

    Used loading balance in distributed intrusion detection system

  15. 一种基于短消息的入侵监测系统的设计与实现

    The Design and Implementation for an Monitoring Intrusion System Based on the Short Message

  16. 基于分布式计算的分布式入侵监测技术是解决问题的好方法。

    The distributed intrusion detection technology based on distributed compute technology is a good solution .

  17. 基于马赫-曾德尔干涉原理设计了一种新型干涉式光纤入侵监测系统。

    A security-monitoring system based on Mach-Zehnder optical fiber interferometer is introduced in this paper .

  18. 针对现有入侵监测系统的不足,提出一种结合协议状态分析的网络入侵检测模型,即采用了将协议分析和状态分析结合的技术。

    This paper presents a novel intrusion detection system ( IDS ) model based on protocol state analysis .

  19. 内容安全技术是继防火墙、网络入侵监测技术之后的又一种网络安全手段。

    It is a new kind of main stream of security technique as firewall and intrusion detection system .

  20. 根据大量实测资料,获得海水入侵监测的2种指标:由特征离子比值构成的水化学指标;

    Based on large quantities of measured data , the authors obtained two sorts of indices for monitoring seawater encroachment , viz .

  21. 本系统针对威海市电子政务网对安全的要求,从防火墙安装设置、入侵监测系统、安全评估系统、安全审计系统和防病毒系统五个方面构建电子政务网安全系统。

    Aiming at covering those security demands of weihai government website , the security system is designed composed of firewall setup system , invading detection system , safety evaluation system , safety audit system and anti-virus system .

  22. 他们可能仍在使用呼吸机,也可能是在接受其他入侵性监测。

    They may still be on a ventilator , or they may have other invasive monitoring .

  23. 建立完善的外来物种入侵风险监测、评估及快速反应体系;

    Establishing perfect inspection and evaluation and fast feedback system of inbreak risk of alien species ;

  24. 对鼎湖山自然保护区外来植物入侵的监测和研究表明,鼎湖山的外来维管植物占所有维管植物种类的比例已达23%。

    According to the monitoring and study conducted in Dinghushan nature reserve , nonnative species take account of23 % of all vascular plant species .

  25. 滨海平原咸水入侵动态监测网构建研究&以潍河下游地区为例

    Study on constitution of dynamic monitoring network for saltwater intrusion into seashore plain : taking the lower reaches of the Weihe River as an example

  26. 莱州湾东岸滨海平原海水入侵的动态监测与数值模拟研究

    Monitoring and Numerical Simulation of Saltwater Intrusion in the Eastern Coast of Laizhou Bay , China

  27. 更多的安全重点应放在诸如主动防御,入侵检测和监测防务政策的第二道防线,减轻或预防攻击的机制。

    More stress should be put on second line of defense policies like proactive defense , intrusion detection and monitoring mechanisms for the mitigation or the prevention of attacks .

  28. 本文首先简要介绍网络安全现状、入侵检测技术和CORBA技术,然后给出应用CORBA建立的分布式入侵监测系统体系结构。

    This paper first introduces the actuality of network security , intrusion detection technology and CORBA , then puts foward the structure of a distributed intrusion detection system based on CORBA .

  29. 本文在分析传统入侵方法后,指出了研究分布式入侵检测方法、入侵检测智能方法、综合性入侵监测系统和检测方法评测系统等的重要性;

    After analyzing traditional intrusion detection methods , the importance of researching technologies of distributed intrusion detection , intelligence of intrusion detection , integrated system of intrusion detection and the evaluating system of intrusion detection have been pointed out .