audit record造句
例句與造句
- Audits record security - related actions for later review by a security administrator
審核將記錄與安全相關的操作,供安全管理員以后復查。 - These hooks are the interface to collect auditing information and manage auditing record
這些鉤子是用于收集審計信息、操作審計記錄的接口。 - Fifthly , the management of auditing record files and the system performance is discussed
第五,探討了審計文件的處理和審計對系統(tǒng)性能的影響。 - Obviously , these audit records are more useful if each administrator has a separate identity
顯然,如果每個管理員都有獨立的身份,則這些審核記錄會更加有用。 - Classfication rules are inductively learned from audit records and used as intrusion detection models
該方法是從原始審計記錄中歸納學習分類規(guī)則并利用這些規(guī)則建立入侵檢測模型。 - It's difficult to find audit record in a sentence. 用audit record造句挺難的
- Audit records are treated as serious messages and sent , by default , to systemout . log from the deployment manager
審核記錄被視為重要信息,并從部署管理器發(fā)送到systemout . log (缺省情況下) 。 - Tax investigation and field audit records of taxpayers for the purpose of tackling tax evasion and promoting voluntary compliance with tax laws
納稅人的稅務調(diào)查和實地審核記錄,以對付逃稅和鼓勵納稅人自動遵守稅務法例。 - If the audit log file reaches its size limit of 200 megabytes , sql server will create a new file , close the old file , and write all new audit records to the new file
如果審核日志文件達到了200 mb的大小限制, sql server將創(chuàng)建一個新文件、關閉舊文件并將所有新的審核記錄寫入新文件。 - According to current research status , auditing system need to be improved in four aspects : the effect to kernel , auditing content , security of audit and the management of auditing record files
綜合現(xiàn)在的研究狀況來看,現(xiàn)有的審計系統(tǒng)主要有四個方面需要改進:審計系統(tǒng)對內(nèi)核的影響、審計的內(nèi)容、審計的安全、審計記錄文件的處理。 - Based on the detailed and comprehensive study on data mining based intrusion detection techniques , naids apply the association rule and classification techniques into detecting intrusion behavior among network audit record from a new perspective
在對既有基于數(shù)據(jù)挖掘方法的入侵檢測技術進行全面分析的基礎上, naids從一個新的角度將關聯(lián)規(guī)則和分類技術應用到網(wǎng)絡審計記錄數(shù)據(jù)中以檢測攻擊行為。 - A critical requirement for the rules to be effective detection models is that a set of appropriate features needs to be first constructed and include in audit records . a key contribution of the thesis is thus in automatic " feature construction "
用規(guī)則建立一個有效的入侵檢測系統(tǒng)的關鍵問題是首先從大量審計數(shù)據(jù)中提取出具有代表性的系統(tǒng)特征,用于描述程序或用戶的行為,因此自動構造特征是本文的主要貢獻。 - Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host . when a training sample set is unlabelled and unbalanced , attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it . when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification , a weighted svm algorithm , i
針對訓練樣本是未標定的不均衡數(shù)據(jù)集的情況,把攻擊檢測問題視為一個孤立點發(fā)現(xiàn)或樣本密度估計問題,采用了超球面上的one - classsvm算法來處理這類問題;針對有標定的不均衡數(shù)據(jù)集對于數(shù)目較少的那類樣本分類錯誤率較高的情況,引入了加權svm算法-雙v - svm算法來進行異常檢測;進一步,基于1998darpa入侵檢測評估數(shù)據(jù)源,把兩分類svm算法推廣至多分類svm算法,并做了多分類svm算法性能比較實驗。