当前位置:
首页 资源下载
搜索资源 - Intrusion Detection
搜索资源列表
-
0下载:
contiki是开源的,可移植的,针对存储空间受限的网络化嵌入式系统和无线传感器网络的多任务操作系统。-Contiki is an open source, highly portable, multi-tasking operating system for memory-efficient networked embedded systems and wireless sensor networks. Contiki has been used is a variety of project
-
-
0下载:
snort源码 snort 是一个基于libpcap的数据包嗅探器并可以作为一个轻量级的网络入侵检测系统( NIDS)-snort is a snort source libpcap-based packet sniffer and can be used as a lightweight network intrusion detection system (NIDS)
-
-
0下载:
Libnids(Library Network Intrusion Detection System)是一个网络入侵检测开发的专业编程接口。它实现了基于网络的入侵检测系统的基本框架,并提供了一些基本的功能。使用Libnids可以快速地构建基于网络的入侵检测系统,并可以在此基础上进一步扩展开发。Libnids实现了入侵检测系统的底层功能,使开发者可以专注于高层的功能开发。-Libnids (Library Network Intrusion Detection System) is a netwo
-
-
0下载:
A secure Intrusion detection system opnet guide
-
-
0下载:
Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world
-
-
0下载:
java source code for ids
-
-
0下载:
BM算法的实现,从入侵检测系统snort中抽取出来的。可供BM算法的编程参考。-BM Algorithm, from the intrusion detection system snort drawn out. BM algorithm for programming reference.
-
-
0下载:
入侵检测的snort_inline源码分析,个人分析的代码流程,不能保证完全正确,属于自己学习文档。-Intrusion Detection snort_inline source code analysis, personal analysis of the code flow, can not guarantee completely correct documentation of their own learning.
-
-
0下载:
关联规则论文:
GP在入侵检测规则提取中的适应度函数设计.pdf
采用数据挖掘的入侵检测技术研究.pdf
分类规则挖掘算法综述.pdf
-Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
-
-
0下载:
防止电脑被BO入侵的代码,对于开发防入侵入侵检测类程序有一定帮助。-To prevent the invasion of computers have been BO code, for the development of intrusion detection intrusion prevention type programs have some support.
-
-
1下载:
入侵检测源码(c++编写)课程设计,用于检测网络流量是否异常-Intrusion Detection source (c++ in preparation) curriculum design, network traffic is used to detect abnormal
-
-
0下载:
计算机入侵检测技术专著
1. 实现安全系统架构
2. 满足清晰和一致的安全需求
3. 最大化地优化安全系统-Attacks on the nation’s computer infrastructures are a serious problem. Over the past 12 years,
the growing number of computer security incidents on the Internet has reflected the growth o
-
-
0下载:
网络入侵检测系统编程源码,供大家学习参考-Network intrusion detection system programming source code, for them to learn information
-
-
0下载:
本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的
审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人
的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实
验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system
-
-
2下载:
1. 具有嗅探功能。
2. 能够对数据包进行过滤
3. 能够分析数据包,甚至能够对系统日志进行检测和分析。
4. 设定检测的规则,可以参考snort的规则。
5. 可以根据用户自己设置的规则进行报警、记录、甚至响应。
6. 能够生成入侵检测系统的日志,记录各种检测到的事件。
-1. With sniffer functionality. 2. Capable of packet filtering 3. Be able to analyze the data packet
-
-
0下载:
create a guy mode for a source sender in intrusion detection
-
-
0下载:
移动自组织网络入侵检测技术研究 论文-research on mobile ad hod network intrusion detection technology
-
-
2下载:
snort轻量级网路入侵检测系统的源代码,是一款非常强大的NIDS工具。-lightweight network intrusion detection system snort source code, is a very powerful tool for NIDS.
-
-
0下载:
基于模式匹配的Windows主机入侵检测系统研究.-Based on pattern matching Windows Host Intrusion Detection System.
-
-
0下载:
基于改进BP算法的入侵检测神经网络方法.-Algorithm based on improved BP neural network intrusion detection.
-
«
1
2
...
5
6
7
8
9
1011
12
13
14
15
...
21
»