intrusion detection造句31) In the design of the network intrusion system, the design of the intrusion detection engine is the key link.
32) By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
33) The feasibility to apply the algorithm of non - negative matrix factorization on intrusion detection is demonstrated.
34) Main work include:The article analyzed currently intrusion detection technique the weakness of haleness, study and ability. etc.
35) An effective and precise pattern matching algorithm is important to intrusion detection system.
36) Adaptive model is a detecting model which is automatically built of intrusion detection systems based on data-mining.
37) On the other hand, EACA is used in intrusion detection module, which makes new intrusions be detected.
38) An efficient intrusion detection technology on probabilistic neural networks is presented.
39) Intrusion detection system is called the second strobe of security.
40) By expressing the magnanimity datum with a small-scale network, clonal network structure was adopted in training the intrusion detection so as to get the compressed data.
41) The most important sector in Misuse intrusion detection is pattern matching.
42) The Unified Wireless Network package consists of a set of wireless local-area network controllers, access devices, and software for WLAN management and intrusion detection.
43) At last, the paper bring forward the network security protection architecture based on Intrusion Detection for a integrated network security cycle.
44) According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
45) It is necessary to analyze feature of input data before intrusion detection.
46) Network intrusion detection module will analyze the package from data packet capture modules and combine network intrusion rule database, and then transmit the results to the system management module.
47) AIDE is an intrusion detection system that detects changes to files on the local system.
48) Through setting up the model characteristic storehouse and describing the systematic procedure, this paper states its principle based on the description of the frame of Intrusion Detection System.
49) The paper also discusses a new intrusion detection technology: protocol analysis.
50) When applying the algorithm to network behavior intelligent learning of intrusion detection system, the error rate is about 10%.
51) Tests indicate that AIAID in intrusion detection can obviously shorten training time and improve detection efficiency.
52) A new intrusion detection method is proposed based on WHVDM kernel function and Center Distance Ratio ( CDR ) .
53) The model of the network security monitor system discussed in the thesis uses the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
54) This clustering algorithm can deal with network intrusion detection from mass unlabeled data, distinguish between normal and abnormal data and detect unknown attacks.
55) It's Security Agents for Network Traffic Analysis uses mobile software agents for intrusion detection in a network of computers.
56) Be able to generate intrusion detection system log to record all detected events.
57) In this paper an intrusion detection model based on system call sequences is proposed, and a normal activity mode of the system call sequences in absolute security environment is established.
58) This paper proposes a new anomaly intrusion detection method based on support vector data description(SVDD ).
59) This paper analyses the current intrusion detection techniques, brings forward a technique that applies cluster algorithm to network intrusion detection, and shows the effect through an experiment.
60) At first, the procreant background and the development process of intrusion detection system was introduced.