Host Intrusion Detection System的意思|示意

美 / / 英 / /

主机入侵检测系统


Host Intrusion Detection System的网络常见释义

主机型入侵检测系统 主机型入侵检测系统(Host Intrusion Detection System,HIDS)往往以系统日志、应用程序日志等作为数据源,当然也可以通过其他手段从所在的主机收集信息,并进行分析。

入侵检测系统 IDS按照数据的获取方式可分为二大类:基于主机的入侵检测系统(Host Intrusion Detection System,HIDS)和基于网络的入侵检测系统(Network Intrusion Detection System,NI...

主机的入侵检测 ...硕士论文 于网络的入侵检测(Network Intrusion Detection System, NIDS)和基于主机的入侵检测(Host Intrusion Detection System, HIDS)两大类,其中基于网络的入侵检测系统因其定义准确、易于实施,且检测准确率较高,因而被广泛使用。

和基于主机的入侵检测 ...硕士论文 于网络的入侵检测(Network Intrusion Detection System, NIDS)和基于主机的入侵检测(Host Intrusion Detection System, HIDS)两大类,其中基于网络的入侵检测系统因其定义准确、易于实施,且检测准确率较高,因而被广泛使用。

Host Intrusion Detection System相关短语

1、 HIDS Host Intrusion Detection System 主机入侵检测系统

2、 Linux Host Intrusion Detection System Linux主机入侵检测系统

3、 Host-Based Intrusion Detection System 入侵检测系统 ; 主机型入侵检测系统

Host Intrusion Detection System相关例句

To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.

针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。

We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

本文提出一种基于CVE标准建立的入侵检测专家系统规则库,该入侵检测专家系统是基于网络和主机的混合结合体,提供集成化的检测、报告和响应功能。

Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.

代理体系的引入,将基于主机的入侵检测和基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统。

Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.

由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。

The first tools for meeting these requirements are system auditing and host-based intrusion detection.

满足这些需求的第一组工具是系统审计和基于主机的入侵检测。

In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.

在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。