Host Intrusion Detection System的意思|示意
主机入侵检测系统
Host Intrusion Detection System的网络常见释义
主机型入侵检测系统 主机型入侵检测系统(Host Intrusion Detection System,HIDS)往往以系统日志、应用程序日志等作为数据源,当然也可以通过其他手段从所在的主机收集信息,并进行分析。
入侵检测系统 IDS按照数据的获取方式可分为二大类:基于主机的入侵检测系统(Host Intrusion Detection System,HIDS)和基于网络的入侵检测系统(Network Intrusion Detection System,NI...
主机的入侵检测 ...硕士论文 于网络的入侵检测(Network Intrusion Detection System, NIDS)和基于主机的入侵检测(Host Intrusion Detection System, HIDS)两大类,其中基于网络的入侵检测系统因其定义准确、易于实施,且检测准确率较高,因而被广泛使用。
和基于主机的入侵检测 ...硕士论文 于网络的入侵检测(Network Intrusion Detection System, NIDS)和基于主机的入侵检测(Host Intrusion Detection System, HIDS)两大类,其中基于网络的入侵检测系统因其定义准确、易于实施,且检测准确率较高,因而被广泛使用。
Host Intrusion Detection System相关短语
1、 HIDS Host Intrusion Detection System 主机入侵检测系统
2、 Linux Host Intrusion Detection System Linux主机入侵检测系统
3、 Host-Based Intrusion Detection System 入侵检测系统 ; 主机型入侵检测系统
Host Intrusion Detection System相关例句
To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.
针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。
We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.
本文提出一种基于CVE标准建立的入侵检测专家系统规则库,该入侵检测专家系统是基于网络和主机的混合结合体,提供集成化的检测、报告和响应功能。
Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.
代理体系的引入,将基于主机的入侵检测和基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统。
Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.
由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。