主机入侵检测系统 meaning in Chinese
hids
Examples
- The improved hmm algorithm is applied in this hids . the test results indicate that the hids has a better detection rate and lower misinformation rate
对实现的主机入侵检测系统进行了测试,得到了较好的检测率和较低的误报率和漏报率。 - An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf )
参考通用入侵检测公共框架( cidf ) ,设计并实现了基于系统调用监控的linux主机入侵检测系统,在其中采用了hmm检测算法。 - Intrusive action or the illegal operation of possibly occurring is distinguished to the various states that the main engine intruding checkout system can monitor the main engine at real time , and voluntarily stops the illegal operation when intruding the action to occur , and the protection main engine system is not intruded
摘要主机入侵检测系统可以实时监测主机的各种状态,辨别可能发生的入侵行为或非法操作,在入侵行为发生的时候自动阻断非法操作,保护主机系统不受入侵。 - At the part of design and implementation of that system we construct an intrusion detection system based on host by the technology of data mining , and this system can real - timely monitor statuses about processes , file system , cpu , memory , register and network of host and we uses the arithmetic about data mining to analyze data about them , as a result we get some rules which can be matched with rules in pattern warehouse
在系统的设计和实现部分,我们把数据挖掘技术运用到入侵检测系统中,构建了一个基于数据挖掘的主机入侵检测系统,可以实时地监控进程状态、文件系统状态、 cpu使用状态、内存使用状态、注册表的使用状况以及主机的网络状态,并运用了数据挖掘算法实时对它们进行分析,形成规则,以便与模式库里的规则进行匹配。 - The paper at first introduces the background of the study on technology of intrusion detection , actuality of intrusion detection system , secondly , the history of development of that technology , the definition and function of intrusion detection , the foreground of intrusion detection system and the limit of the technology of intrusion detection are introduced , and then some basic definitions and arithmetic on data mining in which we emphasize the analyzing of associated rule are introduced . lastly , this paper introduces the design and implementation of a host intrusion system based on data mining and we get a summarization of this system and give an advice about prospect
本文首先介绍了入侵检测技术的研究背景、入侵检测系统的现状,接着介绍了入侵检测技术的发展历程、入侵检测的定义、入侵检测系统的功能以及发展前景和目前入侵检测技术的局限性,然后介绍了数据挖掘的一些基本概念和算法,重点介绍了关联规则分析法,最后介绍了一个基于数据挖掘的主机入侵检测系统的设计和实现,并对系统做了总结和展望。