audit data造句
例句與造句
- 8 analyze audit data into useful feedback tools
分析審核數(shù)據(jù)以便有效反饋。 - audit data analyzing approach for security audit system
安全審計(jì)數(shù)據(jù)的綜合審計(jì)分析方法 - security audit data columns
安全審核數(shù)據(jù)列 - this process will continue until the audit data directory fills up or auditing is turned off
此過程將繼續(xù)下去,直到審核數(shù)據(jù)目錄已滿或?qū)徍吮魂P(guān)閉。 - in fact, intrusion detection technology can be regarded as the analyze process of network's audit data
入侵檢測技術(shù)實(shí)質(zhì)上歸結(jié)為安全審計(jì)數(shù)據(jù)的處理。 - It's difficult to find audit data in a sentence. 用audit data造句挺難的
- the extended aogorithms use the charactereatics of the audit data to direct the efficient computation of " relevant " patterns
擴(kuò)展的算法使用審計(jì)數(shù)據(jù)的特征指導(dǎo)“有關(guān)的”模式的有效計(jì)算。 - owing to complication of computer system and great magnitude of network audit dates, it is difficult to audit data from network
但是計(jì)算機(jī)系統(tǒng)的復(fù)雜化和網(wǎng)絡(luò)數(shù)據(jù)的海量化,為我們安全審計(jì)網(wǎng)絡(luò)數(shù)據(jù)帶來極大的困難。 - so we extend the idmef to support audit data report, detection rules distribution, response instruction, and cooperative analysis in the system
另外,我們對idmef進(jìn)行了擴(kuò)展,以支持系統(tǒng)中審計(jì)數(shù)據(jù)上報(bào)、規(guī)則發(fā)布、響應(yīng)指令、協(xié)作分析等要求。 - with the development of operating system and network technology, the network's audit data has increased sharply . so in intrusion detection, we need study efficacious technology to deal with audit data
然而,操作系統(tǒng)的日益復(fù)雜化的網(wǎng)絡(luò)數(shù)據(jù)流量的急劇膨脹,導(dǎo)致了安全審計(jì)數(shù)據(jù)同樣以驚人的速度遞增。 - with the development of operating system and network technology, the network's audit data has increased sharply . so in intrusion detection, we need study efficacious technology to deal with audit data
然而,操作系統(tǒng)的日益復(fù)雜化的網(wǎng)絡(luò)數(shù)據(jù)流量的急劇膨脹,導(dǎo)致了安全審計(jì)數(shù)據(jù)同樣以驚人的速度遞增。 - this paper presents a model of database intrusion detection system, which uses data mining on the audit data in database systems to derive user profiles that describe normal behavior of users
摘要提出了一種數(shù)據(jù)庫入侵檢測模型,利用該模型對數(shù)據(jù)庫審計(jì)信息進(jìn)行挖掘,以發(fā)現(xiàn)代表合法用戶典型行為的用戶輪廓。 - usually most practical intrusion detection systems ( idss ) in existence only compare the audit data with the attack pattern database, and find the actions in collision with security strategy
現(xiàn)有的大多數(shù)實(shí)用入侵檢測系統(tǒng)通常只是將收集到的審計(jì)數(shù)據(jù)與已有的攻擊模式數(shù)據(jù)庫進(jìn)行簡單的比較,從而發(fā)現(xiàn)違背安全策略的行為。 - the big shortcoming of current ids is unable to detect intrusion behavior quickly when facing large amount of audit data, unable to detect new type of attacks, and high false positive rate which influence greatly the performance of ids
當(dāng)前ids的最大弱點(diǎn)是面對海量的審計(jì)記錄無法快速檢測入侵行為,并且誤報(bào)率之高嚴(yán)重影響了系統(tǒng)性能。 - this technique is implemented and tested on a set of audit data got from university of new mexico, and testing results proved that the technique can clearly distiguished intrusive activities from normal activitis
應(yīng)用該技術(shù)對unm(universityofnewmexico)大學(xué)的審計(jì)數(shù)據(jù)進(jìn)行測試,證明該技術(shù)能夠快速地檢測與辨別進(jìn)程的正?;顒优c異?;顒印?/li> - with development of data mining and machine learning theory, adaptive ids model is developed from large audit data . its research is the work of academic and practicable significance
數(shù)據(jù)挖掘技術(shù)的出現(xiàn)和機(jī)器學(xué)習(xí)理論的發(fā)展提供解決這個問題的有效的手段,我們可以從網(wǎng)絡(luò)海量數(shù)據(jù)開發(fā)出自適應(yīng)的入侵檢測模型,它的研究具有重大的理論意義和實(shí)用價值。
更多例句: 下一頁