host-based system

英 [həʊst beɪst ˈsɪstəm] 美 [hoʊst beɪst ˈsɪstəm]

网络  宿主系统; 基于主机

计算机



双语例句

  1. Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
    当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
  2. It combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.
    他将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
  3. The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system ( HVSPS).
    补丁文件定位是实现主机漏洞扫描及补丁推送系统的关键。
  4. Improved HIPS ( Host-based Intrusion Prevention System) technology assigns a danger rating to unknown programs.
    改进的HIPS(主机入侵防御系统)技术,把危险等级未知的程序。
  5. Design of a Host-based Confidential Information Erasure System
    基于主机的涉密信息清除系统的设计
  6. Design and Implemetation of Host-Based Malcode Detection System
    主机恶意代码检测系统的设计与实现
  7. Nowadays, due to the limitation of host-based IDS ( intrusion detection system), make the technology of agent-based IDS more and more important.
    由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
  8. Our system uses data mining algorisms to analyze network-based and host-based audit data, and to generate intrusion detection rules and models automatically. After data mining process, our system also distributes these intrusion detection models and rules to other detection components automatically.
    针对这个问题,我们使用数据挖掘算法对安全审计数据进行分析处理,帮助系统自动生成入侵检测规则以及建立异常检测模型,并且将这些检测规则和模型自动发布到网络中的其他检测结点。
  9. Chapter three and chapter four have introduced Agent technology and Dynamic Packet Filter technology respectively, and these two techniques will apply to a Host-based Distributed Intrusion Detection System, which will be put forward in chapter six.
    第三章及第四章分别介绍了Agent技术及动态包过滤技术,这两个技术将在第六章提出的一个基于主机的分布式IDS中得到应用;
  10. Also, this paper offered a design and resolve scheme for every composing part, includes scanner, Host-based IDS, Network-based IDS and IDS integration with the firewall system. This paper described the technique of realizing for some portion also.
    并且,对系统中的各组成部分:扫描系统、基于主机的IDS、基于网络的IDS、以及与防火墙的互动,都提出了设计解决方案,对部分系统的实现技术进行了描述。
  11. The Intrusion Detection System can be divided into the Host-based Intrusion Detection System and Network-based Intrusion Detection System according to the data source or the Exception Intrusion Detection System and the Misuse Intrusion Detection System according to the analysis technique.
    入侵检测系统按照数据来源可分为主机入侵检测系统和网络入侵检测系统,而按照检测所采用的分析方法,可分为异常入侵检测系统和误用入侵检测系统。
  12. Based on the intrusion detection model, the thesis designs and actualizes a host-based enterprise database intrusion detection system on windows platform, which can achieve online detection and offline analysis, combining initiative respond technique with passiveness respond.
    在入侵检测模型基础上,设计并实现了一个Windows平台下基于主机的企业数据库入侵检测系统。
  13. We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.
    本文提出一种基于CVE标准建立的入侵检测专家系统规则库,该入侵检测专家系统是基于网络和主机的混合结合体,提供集成化的检测、报告和响应功能。
  14. Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
    审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
  15. This paper describes a host-based intrusion detection system for Microsoft Windows.
    描述了一个针对Windows的基于主机的入侵检测系统。
  16. A Computer Immune Model of Host-Based System Scan
    基于免疫的系统安全扫描模型
  17. Design of host-based overlay IP multicast system
    基于主机的跨网段多播系统设计
  18. The result of test shows, the detection rate of this system is up to 90%, this has shown the systematic structure and algorithm of data mining are correct, it has certain reference value to the further research of host-based intrusion detection system.
    试验结果显示,该系统的检测率高达90%,这表明了本文提出的系统结构和数据挖掘算法的正确性,对主机入侵检测的进一步研究有一定的参考价值。
  19. Soon, DIDS ( distribute intrusion detection system) was studied which gathered host-based with network-based detection method, DIDS was a milestone product in distribute intrusion detection system history.
    很快,将基于主机和基于网络的检测方法集成到一起的分布式入侵检测系统(DIDS)研制出来了,DIDS是分布式入侵检测系统历史上的一个里程碑式的产品。
  20. Secondly, this article illustrates the method to realize the project and establishes the model which is a host-based intrusion detection system based on data mining. This model has some features: ( 1) Apply two kinds of data mining algorithms: association rule and classification rule;
    其次根据目前入侵检测存在的问题提出了基于数据挖掘的主机入侵检测系统的模型与实现方案,该模型有以下特点:(1)使用关联规则和分类规则两类数据挖掘算法;
  21. To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.
    针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。
  22. Due to decryption the data, the communications hosts need to transmit the declassified document, so the solution mainly used in host-based intrusion detection system and this paper add it in HIDS subsystem to implement.
    由于加密数据的解密需要通信双方进行密钥等相关信息的传递,所以此处的改进主要应用在基于主机的入侵检测系统中,本文中将其添加在HIDS子系统中实现。
  23. According to the data sources of detection, intrusion detection system can be divided into host-based intrusion detection systems and network-based intrusion detection system. This paper discusses the Linux-based host intrusion detection system.
    入侵检测系统根据检测的数据源可以分为基于主机的入侵检测系统和基于网络的入侵检测系统,本文主要探讨了基于Linux的主机入侵检测系统。
  24. In order to ensure the stability of the system, the host-based intrusion detection system of information service node also uses virtualization technology to ensure the operating system to quickly return to pre-attack state.
    为了保证系统稳定的运行,信息服务结点的主动防御系统还使用了虚拟化技术保证操作系统能迅速恢复到被攻击前的状态。
  25. This algorithm is also compatible with the development of dynamic programming algorithms. Lastly, this thesis summarizes existing botnet counterattacking techniques, and develops a host-based bot detection system.
    最后,本文设计开发了一个基于主机的僵尸工具检测系统,并对现有的僵尸网络反制技术进行了总结。