8 analyze audit data into useful feedback tools 分析審核數(shù)據(jù)以便有效反饋。
audit data analyzing approach for security audit system 安全審計(jì)數(shù)據(jù)的綜合審計(jì)分析方法
Security audit data columns 安全審核數(shù)據(jù)列
This process will continue until the audit data directory fills up or auditing is turned off 此過程將繼續(xù)下去,直到審核數(shù)據(jù)目錄已滿或?qū)徍吮魂P(guān)閉。
In fact, intrusion detection technology can be regarded as the analyze process of network's audit data 入侵檢測技術(shù)實(shí)質(zhì)上歸結(jié)為安全審計(jì)數(shù)據(jù)的處理。
The extended aogorithms use the charactereatics of the audit data to direct the efficient computation of " relevant " patterns 擴(kuò)展的算法使用審計(jì)數(shù)據(jù)的特征指導(dǎo)“有關(guān)的”模式的有效計(jì)算。
Owing to complication of computer system and great magnitude of network audit dates, it is difficult to audit data from network 但是計(jì)算機(jī)系統(tǒng)的復(fù)雜化和網(wǎng)絡(luò)數(shù)據(jù)的海量化,為我們安全審計(jì)網(wǎng)絡(luò)數(shù)據(jù)帶來極大的困難。
So we extend the idmef to support audit data report, detection rules distribution, response instruction, and cooperative analysis in the system 另外,我們對idmef進(jìn)行了擴(kuò)展,以支持系統(tǒng)中審計(jì)數(shù)據(jù)上報(bào)、規(guī)則發(fā)布、響應(yīng)指令、協(xié)作分析等要求。
With the development of operating system and network technology, the network's audit data has increased sharply . so in intrusion detection, we need study efficacious technology to deal with audit data 然而,操作系統(tǒng)的日益復(fù)雜化的網(wǎng)絡(luò)數(shù)據(jù)流量的急劇膨脹,導(dǎo)致了安全審計(jì)數(shù)據(jù)同樣以驚人的速度遞增。
With the development of operating system and network technology, the network's audit data has increased sharply . so in intrusion detection, we need study efficacious technology to deal with audit data 然而,操作系統(tǒng)的日益復(fù)雜化的網(wǎng)絡(luò)數(shù)據(jù)流量的急劇膨脹,導(dǎo)致了安全審計(jì)數(shù)據(jù)同樣以驚人的速度遞增。