搜索资源列表
ids
- 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
ch1
- 酒店管理IDS(Intrusion Detection System)就是入侵检测系统,它通过抓取网络上的所有报文,分析处理后,报告异常和重要的数据模式和行为模式,使网络安全管理员清楚地了解网络上发生的事件,并能够采取行动阻止可能的破坏-csharp develop based on asp.net
CVE_intrusion
- 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态
104
- This an intrusion detection code. I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code. I hope this will help people doing work in IDS with secure aodv..
192010k-average
- kmeans均值聚类算法:一种改进的基于半监督聚类的入侵检测算法ASCID(Active-learning Semi-supervised Clustering Intrusion Detection),-kmeans clustering algorithm Algorithm was simulated by KDD 99 datasets, which the experimental results demonstrate that ASCID algorithm can impro
81404566ssl_survey
- 基于半监督学习的入侵检测技术研究 聚类程序- Intrusion Detection Algorithm Based on semi-supervised learning
AttackMoniter
- 这是一个网络入侵检测的系统,喜欢网络安全的朋友可以用来学习一下,希望大家一起进步-This is a network intrusion detection systems, like network security can be used to study how a friend I hope everyone progress
fwmon-1.0.9.tar
- firestorm是一个高性能网络入侵检测系统(NIDS)。目前它只有一个传感器,但计划是包括 支持实时分析、报告、远程控制台和快速切换传感器 配置。支持即插即用,非常灵活。执行效率很多比我测试过的其他系统(如如Snort和prelude)高一倍-Firestorm is an extremely high performance network intrusion detection system (NIDS). At the moment it just a sensor but
intrusiondetectionbasedonmachinelearning
- 基于机器学习的入侵检测技术研究,机器学习是CS领域中最好玩的分支之一。把它应用到网络安全领域也是很有意思的。-Intrusion detection based on machine learning technology research, the field of machine learning is the CS branch of one of the most fun. And apply it to the field of network security is also ver
snort-2.8.3.1.tar
- CCNP\ccnp课件\入侵检测系统_Linux\snort-2.8.3.1.tar.gz-CCNP \ ccnp courseware \ Intrusion Detection System _Linux \ snort-2.8.3.1.tar.gz
Design
- sending intrusion detection for A wireless Intrusion detection system and a new attack model
cv
- 入侵检测系统源码分析,3. 能够分析数据包,甚至能够对系统日志进行检测和分析。-Intrusion Detection System source code analysis, 3. Be able to analyze the data packets, and can even log on the system testing and analysis.
output
- Neural Network based classification of various intrusion detections
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
FuzzyIntrusionDetectionSystemviaDataMining
- There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applia
IDS
- A Java Based Network Intrusion Detection System (IDS)
Intrusion
- intrusion detection information.in these process used to recover the intrusion system
Serial
- 串联在线入侵检测及防护等网络安全,网络问题-Serial line protection, and intrusion detection and network security
General_neural_network_of_clustering_algorithm
- 模糊聚类虽然能够对数据聚类挖掘,但是由于网络入侵特征数据维数较多,不同入侵类别间的数据差别较小,不少入侵模式不能被准确分类。本案例采用结合模糊聚类和广义神经网络回归的聚类算法对入侵数据进行分类。 -Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was l
Process-tracking-method-based-Intrusion-Detection-
- 基于程序追踪方法的入侵检测系统的设计与研究-Process tracking method based Intrusion Detection System Design and Research