入侵
- 与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
As the most of traditional Intrusion Detection Systems are static and have difficulty in coordinating with the outer dynamic situation, consequently, leading to a serial of deficiency such as limited distribution .limited accommodation and limited robust etc. Fortunately, the Human Immune System can protect themselves from the invasion of the virus, germina and all such sort of things. Meanwhile, they has a lot of excellent features such as good distribution, Self-organization,dynamic and so on and these features perform fabulous similarity on the function and characteristic with the Intrusion Detection System,which arousing peoples highly attention and interesting and make the researching and development of the Intrusion Detection System based Human Immune System becoming one of the hot and the key of the network security research.
由于传统的入侵检测系统大多是静态的,很难与动态环境协调一致,造成分布性差,适应性差,健壮性不好等种种缺陷;而生物免疫系统可以保护人类机体不受诸如病毒,病菌等各种病原体的侵害,且表现出了分布式保护,多样性,自组织性,动态性等良好特性,且这种与入侵检测系统在功能和特性上的惊人相似,引起人们的高度重视和兴趣,使得借鉴生物免疫系统的机理开发研究入侵检测系统成为网络安全的研究热点和重点。
-
Therefore, some these fields are thoroughly investigated in this dissertation, which are respectively mentioned as the following: 1. The Formal Description Language ISITL for Intrusion Signatures ISITL is a high-abstractive formal description language for representing intrusion signatures based on the interval temporal logic and first-order predicate calculus.
本论文对此展开了全面深入的研究,其内容主要包括: 1、基于时段时态逻辑和一阶谓词逻辑的入侵特征形式化描述语言ISITL ISITL克服了以往检测语言以"情景描述"为主的缺陷,转而采用形式化的方法来刻画入侵模式的入侵特征。
-
Compared with traditional invasion detection system has a lot of advantages to invade the detection system distributed: Distributed IDS is that a lot of measures the land to different data sources, adopts different measuring algorithms, measure together, cooperate and deal with, has improved the accuracy measured ; But distributed IDS can be used in the extensive network environment; Distributed IDS may use the special package to be punish and audit datum safely, help the system to be produced and invade the rule of measuring and produce and unusually measure models ; Distributed IDS analyses the behaviors of a lot of control points in coordination, may measure out and attack distributed in coordination ; The measuring of distributed IDS right a certain control point can be regarded as the early warning of other check points .
分布式入侵检测系统跟传统的入侵检测系统相比有很多优点:分布式IDS是多个检测域针对不同的数据来源,采用不同的检测算法,共同检测,协作处理,提高了检测的准确性;分布式IDS却可以用于大规模的网络环境;分布式IDS可以使用专门的组件处理安全审计数据,帮助系统生成入侵检测规则和生成异常检测模型;分布式IDS协同分析多个监控点的行为,就可能检测出分布式协同攻击;分布式IDS对某个监控点的检测可以作为对其他检测点的预警。
-
Traditional data mining techologies used in data mining need to build intrusion detection model in labled data set. The process to lable data set is all by hands, and if the lables have some errors, the efficiency of the intrusion detection system will be affected. Unsupervised anomaly detection methods can detect the anomaly records in unlabled dataset.
传统的面向入侵检测的数据挖掘技术需要在大量的已标记数据集上建立入侵检测模型,数据集的标记过程需要以手工的方式进行,并且如果标记错误,将导致入侵检测系统检测效率的降低。
-
The relationship between weed invasion and intensity was analysed on sown pasture mixed by whiteclover and perennial ryegrass,and the preliminary results were that 1the number of invasive weeds ismainly dependent on grazing intensity;2the trend of species diversity was successively increase-decrease-increase when the grazing intensity is increase;3 principal invasion weed species are Lysimachiahemsleyana, Eragrostis nigra, etc,8 species;4the sown pasture in question is pioneer stage of the recoverysucce...
本文分析了白三叶草十多年生黑麦草混播人工草地上杂草入侵与放牧强度之间的关系,得出如下初步结论:1)杂草入侵的种数主要决定于放牧强度;2)α物种多样性随放牧加重而有增-减-增的趋势;3)入侵的主要杂草种为点腺过路黄等8个种;4)所论人工草地都处在恢复演替的先锋阶段,因而草地退化的进程还是能予以遏制的。
-
The mobility and wireless links bring some problems which won't occur in lineate networks. Some technologies about security that used in lineate networks frequently become useless. In order to resist the attacks, we can take some traditional preventive measures, such as encryption and validation, but it's not enough for the security of MANET, because it can only reduce, not eliminate the attacks.
要抵抗对Ad Hoc网络的袭击,可以采用一些传统的入侵预防技术,比如加密和鉴权,但是入侵预防技术只能减少袭击的发生,不能完全消除袭击,因此,有必要引入入侵检测技术,在袭击的早期阶段就收集足够的袭击证据,采取相应的抵抗措施,使侵害损失大大降低。
-
The intrusive detection technology, as an important security measure for computer network information, and a dynamic safety protection technology, provides real-time protection to interior and exterior attacks and maloperation, and could intercept and respond the intrusion before the network system is endangered.
入侵检测技术是计算机网络信息安全检测的重要手段之一,入侵检测作为一种动态的安全防护技术,提供了对内部攻击、外部攻击和误操作的实时保护,在网络系统受到危害之前拦截和响应入侵。
-
In this study, 22 ground field plots were set up in the leucocephala invasion areas. Important value index and Two-way indicator species analysis were used. According to the levels of invasion of leucocephala that can be divided into three forest types: Vitex negundo-Leucaena leuococephala type, Acacia confuse-Leucaena leuococephala type and Murraya paniculata-Leucaena leuococephala type. The companion plants are Acacia confuse, Vitex negundo, Bridelia monoica, and Melanolepis multiglandulosa.
本研究於银合欢入侵区域,设置22个地面调查样区,利用重要值指数及双向指标种分析,得知银合欢入侵,依入侵程度不同可分为埔姜-银合欢型(vitex negundo-Leucaena leuococephala type)、相思树-银合欢型(Acacia confuse-Leucaena leuococephala type)及七里香-银合欢型(Murraya paoiculata-Leucaena leuococephala type)三型,而主要伴生树种为相思树、埔姜、土密树、虫屎等。
-
The effects of the invasion of the imported fire ant,solenopsis invicta on the communities of the native ant s were investigated by bait methods in BeiLiu,GuangXi from Sept.
对入侵区与未入侵区比较发现不同生境下,红火蚁入侵使本地蚂蚁的个体数量明显降低,丰富度、多样性和均匀性指数均下降,优势度指数升高,红火蚁成为优势种。
-
To assess the invasion risk of alien marine species, an invasive risk assessment system was constructed based on the characters of introduced marine species and on the analysis of literatures and expert consultancy. The system has 5 primary and 20 secondary indexes, and was constructed using analytic hierarchy process method and trigonometrical fuzzy numbers for determining the weight of each index of the system.
中文摘要:为了评估外来海洋物种入侵的风险,根据外来海洋物种入侵特点,在文献分析和专家咨询的基础上,采用层次分析和三角模糊数数值标度计算权重的方法,设计5个一级指标和20个二级指标,构建了外来海洋物种入侵风险评估体系。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。