| 1. | Policy server is not a part of the model of cidf . the policy server refers to kerberos system . it realizes concentrate authentication and key management 策略服务器的设计参照了kerberos系统,它实现了一种集中式的认证和安全的密钥分发。 |
| 2. | An hids based on monitoring linux system calls is designed and implemented according to common intrusion detection framework ( cidf ) 参考通用入侵检测公共框架( cidf ) ,设计并实现了基于系统调用监控的linux主机入侵检测系统,在其中采用了hmm检测算法。 |
| 3. | In chapter 2 , the classification of inirusion detect is intfoduced in detail . then the work done by some standardized organization ( cidf and idwg ) is introduced 第二章首先介绍了入侵检测的分类并详细介绍了各种异常入侵检测及基于特征的入侵检测方法。 |
| 4. | The last chapter of the thesis expatiates the design thought and implementation method of a distributed ids with cidf framework based on protocol analysis 文章的最后一章详细阐述了一个分布式的、具有cidf体系结构的、基于协议分析的ids的设计思想和实现方法。 |
| 5. | Based on intrusion detection common intrusion detection framework ( cidf ) architecture , a new network intrusion detection model of multi - data packages analysis was presented 摘要在入侵检测cidf体系结构基础上,提出了基于网络的二层式多数据包分析入侵检测模型。 |
| 6. | With closed research of the intrusion detection techniques and the cidf specifications , we implement an nids with basic detection functions in laboratory enviroment 通过对入侵检测技术和相关的cidp标准文档的深入研究,我们在实验环境下实现了一个具有基本入侵检测能力的基于网络的入侵检测系统。 |
| 7. | The paper discusses two standards about intrusion detection : cidf and idwq and talks over its tendency . the paper gives a software implementation for intrusion detection system under linux 论文还讨论了当前两个有关入侵检测的标准: cidf标准和idwg标准,并在此基础上讨论了入侵检测的发展趋势。 |
| 8. | On the designing part of the raas , the generation of events , the normal library of users , the process of detecting and analyzing , and the response units were described based on the cidf 在此基础上,在实时审计分析系统的设计部分,依照通用的入侵检测模型( cidf )对监控事件的产生、用户正常规则库、监控分析过程和响应单元逐个进行阐述。 |
| 9. | Cidf is a standard of intrusion detection system . the ids is on the basis of cede it is made up of four components : event generator , event analyzer , response unit and policy server . event generator collects events Cidf是入侵检测系统的一个标准,本文在cidf的基础上设计了一个自己的系统,系统由4今组件组成:事件产生器、事件分析器、响应单元和策略服务器。 |
| 10. | According the cidf pattern , the system was divided into five fundamental modules : packet capture , network sniffer , rules disposal , data analyze and system reaction . each module mapp ed to different applications and the system function was introduced in brief 根据cidf入侵检测模型,将系统分为五个基本模块:数据捕获、网络监听、规则处理、数据分析和系统响应模块,分别对应于不同的应用功能;并对目前开发的系统功能做了简单的介绍。 |