privileged processing meaning in Chinese
特许处理
Examples
- The detection model is fit for privileged processes , especially for these based on request - response . 4
检测模型适合于针对特权进程(特别是基于请求一反应型的特权进程)的异常入侵检测。 - Security policy configuration goals include controlling raw access to data , protecting the integrity of the kernel and the system software , protecting a privileged process from executing malicious code , and confining any damage done by a privileged process flaw
Openssh隧道也很容易配置,并且由于公钥私钥对和密码短语验证的使用,使它成为极其安全的工作环境。 - Sbpc concentrates on program logic , introduces the notation of privilege state for privilege control ; constructs the explicit relationship between privileges and their parameters ; and improves the privilege computing mechanism of privileged process
Sbpc该机制以程序逻辑为中心,引入了特权状态的概念来进行特权控制;构建了特权与特权参数之间的显式关系;完善了特权进程的特权计算机制。 - Based on the mechanism of computer immune system , this paper presents a new anomaly detection technique to detect intrusion into computer system . in this technique , a markov chain model is used to represent a temporal profile of normal behavior of a process . the markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on unix system
传统的入侵检测技术,依照所基于的原则不同,通常分为误用入侵检测与异常入侵检测,本文在入侵研究中所采用的计算机系统免疫思想的基础上,提出了一种新的异常入侵检测技术,通过对( unix系统)特权进程系统调用序列的历史数据的学习,用马尔可夫链模型来建立特权进程的正常时态行为轮廓。 - The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process , and set up a fuzzy sub collection b with real time transfer array , then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid , can not only reduce efficiently false positive rate and false negative rate , also make real time intrusion detection to become possibility ; have independent and complete character database , according to the classification of monitoring program , design normal behavior and anomaly behavior etc . , have raised the strongness of ids ; use tree type structure to preservation the character database , have saved greatly stock space ; in detection invade , carry out frequency prior principle , prior analysis and handling the behavior feature of high frequency in information table , have raised efficiency and the speed of detection , make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection , have remedied deficiency of unitary detection method
这种方法的实质是在监控特权进程的正常系统调用基础上建立正常行为模糊子集a ,用检测到的实时调用序列建立模糊子集b ,然后用模糊识别方法中的最小距离原则进行检测。本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于euclidean距离的入侵检测方法edid ,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。