Welcome![Sign In][Sign Up]
Location:
Search - intrusion detection system

Search list

[Internet-NetworkJIDX

Description: windows系统下用java开发的网络入侵检测程序-windows system with java development of the network intrusion detection procedures
Platform: | Size: 398336 | Author: 刘伟 | Hits:

[Internet-Networklnids

Description: 这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
Platform: | Size: 8248320 | Author: liuliang | Hits:

[File Format456123

Description: 基于数据挖掘的入侵检测系统的设计与实现 基于数据挖掘的入侵检测系统的设计与实现-Based on Data Mining Intrusion Detection System Design and Implementation Based on Data Mining Intrusion Detection System Design and Implementation
Platform: | Size: 59392 | Author: Jihong | Hits:

[Software EngineeringTheAlgorithmofDetectorsGeneratinginIntrusionDetect

Description: The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory-The Algorithm of Detectors Generating in I ntrusion Detection System Based on Artificial Immune Theory
Platform: | Size: 434176 | Author: yangkk | Hits:

[Program docfengpf

Description: 这是我本科的毕业设计的文档,题目是入侵检测系统的设计与实现-This is my undergraduate graduation design documentation, the topic of Intrusion Detection System Design and Implementation
Platform: | Size: 228352 | Author: 冯鹏斐 | Hits:

[Software Engineeringids_agent

Description: 基于移动 Agent的数据采集系统实现与性能分析,入侵检测-Mobile Agent-based Data Acquisition System Implementation and performance analysis, intrusion detection
Platform: | Size: 43008 | Author: 陈晓峰 | Hits:

[Firewall-Securitywnqd(1)

Description: 一个入侵检测系统,基于WINDOWS平台的,源码,大家一起学习交流-An intrusion detection system, based on the WINDOWS platform, source code, the exchange of everyone learning together
Platform: | Size: 3291136 | Author: 剑侠 | Hits:

[Internet-Networksnort-2.8.1

Description: 开源入侵检测系统snort最新版本.可在此基础上做进一步开发-Open-source intrusion detection system snort the latest version. Can make on this basis to further develop
Platform: | Size: 4809728 | Author: nalra | Hits:

[Software Engineering5

Description: 基于agent 的入侵检测系统,希望对大家有用-Agent-based intrusion detection system, in the hope that useful to everybody
Platform: | Size: 6875136 | Author: 林辉 | Hits:

[Internet-Networkids

Description: 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
Platform: | Size: 13312 | Author: 王佳妮 | Hits:

[Booksppt

Description: 主要以入侵检测系统的为主 很有用 做参考-Mainly based Intrusion Detection System is used as reference
Platform: | Size: 373760 | Author: 王佳妮 | Hits:

[Internet-NetworkCVE_intrusion

Description: 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态,制订了国内统一的 CVE 标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题.-The author also describes the architecture and functions and the design and the implement of the software. Intrusion detection system (IDS) is very important for network security. At present, the author systematically analyzes the composition and semantics of Snort rules, which may be of great help for creating signature database, then the paper studies the flexibility and self-controllability in the CVE-based Intrusion Detection System, emphasizes not only on analysis of the snort rules, but on the realization of intrusion detecting based on CVE rules and the implement of the sniffer. Especially, this paper covers the intrusion signature matching methods, and analyzes the weakness when only uses pattern matching in intrusion analysis and presents an improved approach that combines protocol analysis and pattern matching, to dectect attacks. At the same time it gives an example to show how to use this approach. The experimental results show that the rules surely reduce the rate of misd
Platform: | Size: 478208 | Author: 陈中 | Hits:

[OS programNetwork-Intrusion-Detection-System

Description: linux环境下运行的,以c语言编程的入侵检测系统-running under the linux environment, intrusion detection system to the c programming language
Platform: | Size: 2354176 | Author: wangwang | Hits:

[AI-NN-PRHacker-intrusion-detection-system

Description: 本文的目的就是对人工神经网络进行适当的改进,将其应用于网络黑客入侵检测系统中,以提高系统的效率,包括检测速度的提高、减少漏报率和误报率-The purpose of this paper is the appropriate improvement of artificial neural networks, intrusion detection system applied to hackers in order to improve the efficiency of the system, including the improvement of detection speed, reducing the false negative rate and false alarm rate
Platform: | Size: 173056 | Author: 毛玉凤 | Hits:

[ApplicationsIntrusion-Detection-System-over-Abnormal-Internet

Description: Intrusion Detection System over Abnormal Internet Sequence
Platform: | Size: 3507200 | Author: sachin | Hits:

[ExploitIntrusion-Detection-System-Using-Wireshark

Description: Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station
Platform: | Size: 646144 | Author: ahmed | Hits:

[Windows DevelopA-HoneyPot-Network-Intrusion-Detection-System

Description: A HoneyPot Network Intrusion Detection System Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port. This file came from Planet-Source-Code.com...the home millions of lines of source code
Platform: | Size: 7168 | Author: sakthivel | Hits:

[OS programHybrid-Intrusion-Detection-System-master

Description: hybrid intrusion detection system
Platform: | Size: 3088384 | Author: tinly | Hits:

[OS programIntrusion-Detection-System-master

Description: network intrusion detection system
Platform: | Size: 8384512 | Author: tinly | Hits:

[CloudComputingintrusion detection system (IDS)

Description: intrusion detection system (IDS) Deep Learning (DL) has emerged as a new approach that delivers higher accuracy than traditional machine learning techniques. DL has the ability to process raw data and learn the high level features on its own, and so DL has a strong case for its adaptability in resource constrained networks like SDNs.
Platform: | Size: 3205378 | Author: thirumal@techquest.info | Hits:
« 1 23 4 5 6 7 8 9 10 ... 15 »

CodeBus www.codebus.net