网络安全审计

  • 网络Network Security Auditing
网络安全审计网络安全审计
  1. DFL在网络安全审计中的应用研究

    The Application and Research on DFL in Network Security Auditing

  2. 因此网络安全审计系统开始受到广泛的重视。

    Network security auditing system catches more and more attention of the system administrators .

  3. 针对基于RBAC的Web服务安全模型中的网络安全审计问题,提出了基于IMD的Web代理过滤模型。

    For the issue of the security audit in the RBAC-based security model of the Web Service , it presents the filter model of Web proxy based on IMD .

  4. 在对当前各种主流的过滤技术进行了分析比较之后,通过在WINDOWSnt环境下的实验,介绍了该过滤驱动程序的工作流程和开发细节,分析了其在Web服务网络安全审计中的优良性能。

    Compared with the filtering technologies of current mainstream , this paper describes the workflow and development details of this filtering driver program under the environment experiment of the Windows NT platform , and emphasizes its excellent performance in the network security audit of the Web Service . 5 .

  5. 本文提出的DMNIDS模型应用数据挖掘技术对网络安全审计数据进行分析处理,提高了系统的有效性;

    However , DMNIDS uses data mining technology to analysis and deal with network security audit data to improve its availability ;

  6. 改进的关联规则算法在网络安全审计中的应用

    Association Rules Algorithm Improvement and Application in Network Security Audit

  7. 基于日志数据挖掘的网络安全审计技术研究

    Research on Technique of the Network Security Audit Based on Log Data Mining

  8. 而网络安全审计是网络安全体系的一个重要部分。

    While web security audit is an important part of the web security system .

  9. 网络安全审计系统的设计和实现

    Network Security Audit System Design and Implementation

  10. 税务系统内部网络安全审计探讨

    Network Security Audit in Tax Net System

  11. 本文着重分析了网络安全审计是如何在网络安全中起作用的。

    This paper is about how the web security audit work in the web security .

  12. 论文最后给出了网络安全审计系统的测试环境和测试结果,并对系统的测试结果和性能进行了详细的分析,给出了系统的适用环境。

    Finally , the test environment and results of the network security audit system are described .

  13. 网络安全审计系统

    Network Security Auditing System

  14. 入侵检测技术通过对网络安全审计数据进行分析和处理来发现网络中的入侵活动和入侵者,在网络安全领域起到了重要的作用。

    By analyzing and processing data of network security audit , intrusion detection system can find intrusive activities and invaders .

  15. 网络安全审计是实现安全管理的最重要的因素,它是一个安全的网络必须支持的功能特性。

    Network Security Audit is an important factor of security management , it record the action of user in this system .

  16. 要防范这一安全隐患需配置网络安全审计系统,以达到对网络的监控和审计。

    To avoid this defect , we need to set up network security auditing system to monitor and audit the network .

  17. 网络安全审计系统对网络进行监控,发现有违安全的网络事件。

    This paper introduces the implementation method of the network security auditing system and several current solutions that have their shortcomings .

  18. 通过对系统参数进行设置,可以灵活方便地将网络安全审计系统应用于各种不同的实际环境中,以满足不同用户的具体需求。

    By setting the system parameters , the enterprise network managers can use this system in the different enterprise network environment .

  19. 网络安全审计是确保网络安全的重要防护方法,而信息融合是一种有效的信息处理和分析技术。

    Network security auditing is the important way to protect network . And information fusion is the effective information disposing and analyzing technology .

  20. 接着分析了我们开发的网络安全审计系统的总体结构和原理,以及它在可扩充性和攻击深度等方面的发展。

    And emphatically analyze the structure and theory of network security auditing system developed by ourselves , and the development on extensibility and the depth of attack .

  21. 最后,将所提出的量化关联规则挖掘算法在网络安全审计系统上进行了实验测试,并取得了令人满意的效果。

    Finally , the paper confirms the mentioned algorithms of quantitative association rules of log mining on the Network Security Audit System and gets a successful result .

  22. 而基于免疫原理的网络安全审计系统能够利用不完备信息检测异常现象,不仅检测出未知的攻击模式,更能快速检测已知的攻击模式。

    However , security audit system based on immune principle can detect not only the known attacking patterns but also the unknown ones more rapidly using incomplete information .

  23. 实验结果表明,改进的关联规则学习算法在网络安全审计的自适应能力上有较好表现,取得了预期效果。

    The experiments show that the improved learning algorithm of association rules in network security audits have better performance of automatic adaptive capacity , achieving the expected effect .

  24. 网络安全审计技术同防病毒、防火墙、入侵检测等安全技术一样成为网络安全技术的重要组成部分。

    The technology of Network Security Audit is referred to one of the important pillars of network security technology , as well as anti-virus , firewall , intrusion inspect .

  25. 最后,提出了一个基于用户数据流的分布式网络安全审计系统的框架,保证了服务器的处理能力和审计系统的扩展性能,并设计与实现了系统的各个模块。

    At last , this thesis presents the main frame of a distributed audit system of network security based on traffic flows . The frame guarantees the processing ability of servers and the expansibility of the audit system .

  26. 由于网络安全审计系统需要处理大量的日志信息,笔者针对现有审计系统的不足,提出在安全审计系统中采用信息融合技术。

    There is a lot of log information to be disposed in network security information system . Pointing to the fault in the current auditing system , it advances to use the technology of information fusion in security auditing system .

  27. 试验结果表明,相比于传统的类似方法,本文对决策树分类方法处理审计数据过程中的主要环节进行优化后,在一定程度上提高了网络安全审计的速度和准确率。

    Test results show that compared with traditional similar methods , after optimizing the main procedures of decision tree classification method processing audit data , to a certain extent , the speed and accuracy of network security audit are improved .

  28. 网络行为安全审计系统Web应用的设计与实现

    Design and Realization of Web Application in Network Behavior Security Auditing System

  29. 网络信息安全审计系统关键技术研究

    Research on Key Technology in Network Information Security Audit System

  30. 网络集中安全审计系统的研究与应用已经成为国内外研究的热点。

    The research and application of network concentration security audit system is becoming the focus of world .