查询词典 IDS
- 与 IDS 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The use of IDs does make sense when object and database are disconnected, for instance in stateless applications.
当对象和数据库断开连接的时候,标识的使用是没有意思的,比如在无状态程序中。
-
The use of IDs does make sense when object and database are disconnected, for instance in stateless applications.
当对象和数据库断开连接的时候,标识的使用才是有意思的,比如在无状态程序中。
-
The essence of EDID is to set up a normal behavior fuzzy sub collection A on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection B with real time transfer array, then detect with the principle of minimum distance in fuzzy discernmethodThe innovation point of this paper is : Put forward the method of EDID, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of IDS; Use tree type structure to preservation the character database, have saved greatly stock space; in detection invade , carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method.
本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于Euclidean距离的入侵检测方法EDID,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。
-
Subrule IDs need to be unique only within a group.
子规则的ID的唯一性只是在同组中要求。
-
The flavono ids contained in Trollius ledebourli Reichb.should be studied and further us ed.
对短瓣金莲花中的黄酮应该加以研究和开发利用,短瓣金莲花可能是中药金莲花的一种代用新药源。
-
However, with the appearance of large scale and high speed network, it leads to more and more rampant the actions of hackers, the more secluded intrusive tricks and unpredictable losses which pose a large challenge to the existing IDS.
然而,大规模高速网络的出现、日益猖獗的黑客活动、日新月异的入侵手段、越来越大的破坏性,对传统的入侵监测系统提出了前所未有的挑战。
-
The role acted by Intrusion Detection System in protecting network is becoming more and more vital, from another point of view; it brings a new trouble that NIDS would produce masses of alarms, most of which are redundant and unavailable.
然而,入侵检测系统在保护网络的同时也带来了一个新的问题:NIDS(Network-IDS)会产生大量的报警数据,这些大量报警数据中的大部分都是重复无效的。
-
Therefore, we are attaching a file with the IDs and nicknames of those we have successfully checked.
因此,我们附了一个已经成功检测的ID和昵称的文件。
-
Today computer technology develops at very fast speed, intrusion technology renovates rapidly,IDS technology face great challenge.
现今的计算机技术飞速发展,入侵手段也随着快速翻新,入侵检测系统也面临很大的挑战。
-
This acts in a similar way to class IDs in scripted plug-ins.
这以类似的方式行动到脚本插入中的类别ID。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。