CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - Network intrusion detection
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - Network intrusion detection - List
[
Internet-Network
]
网络入侵检测系统(源码)
DL : 0
网络入侵检测系统-Network Intrusion Detection system
Update
: 2025-02-17
Size
: 2.06mb
Publisher
:
张三
[
Internet-Network
]
JIDX
DL : 1
windows系统下用java开发的网络入侵检测程序-windows system with java development of the network intrusion detection procedures
Update
: 2025-02-17
Size
: 389kb
Publisher
:
刘伟
[
Internet-Network
]
IDS
DL : 1
网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Update
: 2025-02-17
Size
: 11kb
Publisher
:
[
Internet-Network
]
lnids
DL : 1
这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
Update
: 2025-02-17
Size
: 7.87mb
Publisher
:
liuliang
[
Other
]
Intrusion-Detection
DL : 0
入侵检测的相关教程,非常全面,建议对网络安全有兴趣的人阅读。-Intrusion Detection related guides, very comprehensive, network security proposed to those who are interested in reading.
Update
: 2025-02-17
Size
: 2.48mb
Publisher
:
Joe Zhao
[
Other
]
cs161.0914
DL : 0
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents-Intrusion Detection : Host-based Intrusion Detection Network
Update
: 2025-02-17
Size
: 56kb
Publisher
:
hn
[
Industry research
]
baseAgent
DL : 0
文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System
Update
: 2025-02-17
Size
: 98kb
Publisher
:
joe
[
Voice Compress
]
shengjingwangluo123456
DL : 0
基于 神经网络 算法的 入侵检测,我的 毕业设计,仅 供大家参考-based on neural network algorithm Intrusion Detection, I graduated in design, is for your reference
Update
: 2025-02-17
Size
: 22kb
Publisher
:
李强
[
Internet-Network
]
iids
DL : 0
加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Update
: 2025-02-17
Size
: 909kb
Publisher
:
yu
[
Software Engineering
]
Network_Intrusion_Detection_3rd_Ed_(2002)
DL : 0
网络入侵检测技术第三版,介绍基本原理和常用方法及实现-The third edition of network intrusion detection technology, introduce the basic principles and common methods and realize
Update
: 2025-02-17
Size
: 2.05mb
Publisher
:
chenhang
[
source in ebook
]
nids
DL : 0
网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement
Update
: 2025-02-17
Size
: 2.14mb
Publisher
:
laizhengwen
[
Internet-Network
]
intrusiondetection
DL : 0
网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
Update
: 2025-02-17
Size
: 2.15mb
Publisher
:
lilang
[
AI-NN-PR
]
BP_nids
DL : 0
基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
Update
: 2025-02-17
Size
: 183kb
Publisher
:
jack
[
Windows Develop
]
Apriori
DL : 0
关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境下的关联规则挖掘算法;多值属性关联规则挖掘;关联规则更新算法;基于约束条件的关联规则挖掘;关联规则并行及分布挖掘算法等。-Association rule mining research work include: Apriori algorithm for the expansion of the number of association rules mining, incremental updating of association rules, there is no need to generate candidate itemsets of association rule mining, maximal frequent itemsets mining, association rule mining binding, as well as parallel and Distribution of association rule mining algorithm, one of the rapid mining frequent itemsets and updating of association rules mining are the focus of the study, but also a variety of data mining technology in key applications, has been used in classification rules mining and network intrusion detection studies. The researchers also carried out the theory of data mining has made useful explorations, to concept lattice and rough sets in association rule mining applied to obtain significant results. So far, the mining association rules has made remarkable achievements, including: stand-alone environment for mining association rules algorithm many associatio
Update
: 2025-02-17
Size
: 1.96mb
Publisher
:
henry
[
MultiLanguage
]
2run-30
DL : 0
入侵检测算法,计算机常用的工具,聚类分析-Intrusion detection algorithm, commonly used computer tools, cluster analysis
Update
: 2025-02-17
Size
: 63kb
Publisher
:
jia
[
Internet-Network
]
ids
DL : 0
网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
Update
: 2025-02-17
Size
: 13kb
Publisher
:
王佳妮
[
SCM
]
DataMiningTechniquesfor(Network)Intrusion
DL : 0
In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of these techniques. Finally we present a new idea on how data mining can aid IDSs.
Update
: 2025-02-17
Size
: 364kb
Publisher
:
keerthi
[
Exploit
]
intrusion-detection
DL : 0
VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
Update
: 2025-02-17
Size
: 2.71mb
Publisher
:
武东亮
[
Windows Develop
]
A-HoneyPot-Network-Intrusion-Detection-System
DL : 0
A HoneyPot Network Intrusion Detection System Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port. This file came from Planet-Source-Code.com...the home millions of lines of source code
Update
: 2025-02-17
Size
: 7kb
Publisher
:
sakthivel
[
Education soft system
]
Intrusion-Detection-System-master
DL : 0
Intrusion Detection for network security
Update
: 2025-02-17
Size
: 135kb
Publisher
:
aquablue
«
1
2
3
4
5
6
7
8
9
10
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.