快好知 kuaihz


intrusion detection造句
1) The seven solutions address intrusion detection, crowd control, loitering, standing vehicles, forbidden direction or path of motion, camera triggering, and facility utilization. 2) While the research of unsupervised intrusion detection which take unlabelled data as training samples is attractive and challenging. 3) The performance efficiency of a network intrusion detection system ( NIDS ) is dominated by pattern matching algorithm. 4) An kernel clustering intrusion detection approach based on outlier detection is presented in this paper. 5) Then it analyzes and compares the existing network intrusion detection algorithm based on artificial immune, and improves the linear time detector generating algorithm for the deficiency. 6) In the intrusion detection systems, matching speed of the string matching algorithm is very important. 7) Distributed intrusion detection systems ( DIDS ) have many advantages such as scalability, subversion resistance. 8) The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work. 9) While using the same data collected by intrusion detection sensors, adaptive model is automatically built. 10) Intrusion detection system as a reasonable complement of Firewall can detect real-time computer and network intrusion events. 11) Second, the security detection technology, mainly through intrusion detection technology. 12) Anomaly detection method is one of the main intrusion detection methods. 13) In this paper , the framework of network intrusion detection technology Based unsupervised outlier detection is discussed. 14) Nowadays there are the following shortcomings in intrusion detection products , lack the effectiveness, flexibility, adaptivity. 15) A technique of high - speed network intrusion detection system based on packet sampling theory is proposed. 16) Other application areas include intrusion detection, web log analysis, database access patterns, and so on. 17) An intrusion detection system(IDS) can detect system or network sources in a real time way, find the intruder in time, and prevent legal users' misoperation. 18) This paper proposes a new Support Vector Machine(SVM) for anomaly intrusion detection method based on Latent Semantic Indexing(LSI). 19) It puts forward an improved distribution architecture according to analyzing the anteriority intrusion detection system. 20) This paper made use of statistical results of vulnerability scanner and intrusion detection systems and presented method of qualitative evaluation of security vulnerability based on fuzzy data fusion. 21) Intrusion prevention system is a new information security technology which can supply a gap of the firewall and the intrusion detection system in the information security domain. 22) Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS. 23) In this paper, binary tree structure substitutes for linked list structure used in traditional IDS, aiming to better storage of rules and improve pattern matching so as to speed intrusion detection. 24) Flowing and precipitation of the self-purification is applied in the intrusion detection for optimizing the detection model and eliminating the latent intrusion data. 25) Analyzing honey-pot and honey-network system, and researching on application of the honey-pot in the intrusion detection and the response in the military computer network. 26) Bayes classifier model is a powerful tool for classifying attack types in intrusion detection. 27) In this paper, the architecture and the detection principle of adaptive model generation systems are studied, then the adaptive model for intrusion detection of computer network is established. 28) Aiming at the problem of traditional intrusion system, such as high false alert rate, alert torrent, alert isolation, a data fusion model in distributed intrusion detection is put forward. 29) Red - M and Madge Networks, Red - Alert Pro and WLAN Probe WLAN intrusion detection devices. 30) The study background and significance of system evaluation and intrusion detection are introduced in this paper.