搜索资源列表
-
0下载:
网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
-
-
1下载:
这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
-
-
1下载:
windows平台下的libnids,最新版本libnids 1.19 for win32,内有VC++工程.可以根据需要修改源码,也可以利用库文件方便地重组TCP等,进行协议还原,构造自己的网络入侵检测系统.-windows platform under the libnids. libnids latest version 1.19 for win32, VC works there. may need to modify the source codes, it can also be u
-
-
0下载:
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents-Intrusion Detection : Host-based Intrusio
-
-
0下载:
加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
-
-
0下载:
Firestorm NIDS是一个性能非常高的网络入侵检测系统 (NIDS)。目前,它只是一个“传感器”,但是计划包括对分析、报表、远程控制和自动传感器配置的支持。它是完全插件式的,因此非常灵活。
-Firestorm NIDS is a very high performance network intrusion detection system (NIDS). At present, it is only a sensor , but the plan includes the a
-
-
0下载:
Snort作为一个轻量级的网络入侵检测系统,在实际中应用可能会有些力不从心,但如果想了解研究IDS的工作原理,仔细研究一下它的源码到是非常不错.首先对snort做一个概括的评论-Snort as a lightweight network intrusion detection system, in practice the application may be unable to, but if you want to understand the working principle of I
-
-
1下载:
关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
-
-
0下载:
关于入侵检测的简介 介绍了网络入侵检测的应用 主要是免疫选择方面的-Briefing on the IDS introduced the application of network intrusion detection is immune selection of
-
-
0下载:
Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employ
-
-
0下载:
There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS applia
-
-
1下载:
IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
-
-
0下载:
I need Network intrusion detection source code in C sharp
-
-
0下载:
介绍了几种重要的网络入侵技术,包括蠕虫病毒,网络嗅探技术,端口探测技术,缓冲区溢出攻击等等.-Describes several important network intrusion technologies,including worms,network sniffing,port detection technology,buffer overflow attacks,and so on.
-
-
0下载:
本课程设计是模拟人体的免疫系统,以及人体内B细胞与T细胞的工作原理,使其应用在计算机的入侵检测中,能够深化的检测出网络上有攻击的信息,从而提高系统的自适应性、动态性和准确性,以弥补传统入侵检测技术的不足-This course is designed to simulate the body s immune system, and human B cells and T cells, the body works, its application in computer intrusion d
-
-
0下载:
windows系统下用java开发发的网络入侵检测程序源码
-Network intrusion detection program source java development issued under the windows system
-
-
0下载:
网络入侵检测系统数据库分析控制台,通过WEB界面来查看snort数据的工具。为了使用ACID,用户系统中必须安装Snort,Apache,MYSQL,PHP。-Database analysis of network intrusion detection system console, view the the snort data the tool through the WEB interface. User' s system must be installed to use AC
-
-
1下载:
在网络入侵检测系统中为ACID提供便捷的数据库接口-ACID provides a convenient interface to the database in the network intrusion detection system
-
-
0下载:
A HoneyPot Network Intrusion Detection System
Descr iption: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes p
-
-
0下载:
An ANN for network intrusion detection. Dataset is the NSL-KDD. Also using PCA for feature reduction.
-