当前位置:
首页
资源下载

搜索资源 - Anomaly intrusion detection
搜索资源列表
-
0下载:
基于C++的网络嗅探器系统的设计与实现 可以进行数据包的解析和了解-Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread and dangerous. The existing signature-based intrusion detection mechanisms are often not sufficient in detecting these types of a
-
-
0下载:
自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。-Since 1980, the concept of generated IDS has been a host-based and network-based intrusion detection system, a model of knowledge-based recognition, ident
-
-
0下载:
p2p异常流量检测,基于传输层特征检测,能检测出基本P2P应用所产生的P2P流量-p2p traffic anomaly detection
-
-
0下载:
Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employ
-
-
0下载:
This white paper aims at briefly describing the technologies currently used in
filter design in Network-based Intrusion Detection System (NIDS). We will consider
the advantages and drawbacks of using signature filters versus anomaly filters,
an
-
-
0下载:
A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs.
The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main
categories of detection principle
-
-
0下载:
入侵检测系统在训练过程中需要大量有标识的监督数据进行学习,不利于其应用和推广.为了解决该问题,提出了一种基于主成分分析的无监督异常检测方法,在最小均方误差原则下学习样本的主要特征,经过压缩和还原的互逆过程后能最大限度地复制样本信息,从而根据均方误差的差异检测出异常信息.构建的仿真系统经过实验证明,基于主成分分析的无监督异常检测方法能够在无需专家前期参与的情况下检测出入侵,实验结果验证了其有效性.-Intrusion Detection System in the training process
-
-
0下载:
商空间粒度聚类的异常入侵检测Quotient space granularity clustering anomaly intrusion detection-Quotient space granularity clustering anomaly intrusion detection
-
-
0下载:
K-means Algorithm Based on Particle Swarm
Optimization Algorithm for Anomaly Intrusion Detection
-
-
0下载:
自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。 已通过测试。
-Since 1980 to produce the IDS concept, host-based and network-based intrusion detection systems, knowledge-based model identification, anomaly
-
-
0下载:
The problem of intrusion detection has been studied and received a lot of attention in
machine learning and data mining in the literature survey. The existing techniques are not
effective to improve the classification accuracy and to reduce high
-
-
0下载:
Friends this is a java project of ieee concept
-
-
0下载:
The title of my paper is An overview of anomaly based intrusion detection systems .-The title of my paper is An overview of anomaly based intrusion detection systems .
-
-
0下载:
基于kmeans的异常检测算法,数据集是kddcup99(Based on kmeans anomaly detection algorithm, the data set is kddcup99.)
-