Welcome![Sign In][Sign Up]
Location:
Search - intrusion detection system

Search list

[Software EngineeringSnort

Description: 分析了数据包调用检测函数匹配规则节点的平均次数计算函数,并用该函数对Snort系统规则树进行了优化,减少了数据包过滤匹配次数,极大提高了入侵检测效率-Analysis of packet matching rules called detection function of the average number of nodes the calculation function, and the system function of the Snort rules tree is optimized to reduce the number of packets matching filter, which greatly improved the efficiency of intrusion detection
Platform: | Size: 122880 | Author: TTstone | Hits:

[OS Developcontiki-2.3

Description: contiki是开源的,可移植的,针对存储空间受限的网络化嵌入式系统和无线传感器网络的多任务操作系统。-Contiki is an open source, highly portable, multi-tasking operating system for memory-efficient networked embedded systems and wireless sensor networks. Contiki has been used is a variety of projects, such as road tunnel fire monitoring, intrusion detection, water monitoring in the Baltic Sea, and in surveillance networks.
Platform: | Size: 15631360 | Author: 钱勇 | Hits:

[Internet-Network3-Snort

Description: Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world
Platform: | Size: 7284736 | Author: 张宝军 | Hits:

[Scannersnort-sort

Description: 入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whether the network or system in violation of security policy behavior and indications of attack
Platform: | Size: 2048 | Author: liyabin | Hits:

[Internet-Networksnort_2.2

Description: Snort已发展成为一个多平台(Multi-Platform),实时(Real-Time)流量分析,网络IP数据包(Pocket)记录等特性的强大的网络入侵检测/防御系统(Network Intrusion Detection/Prevention System),即NIDS/NIPS.Snort符合通用公共许可(GPL——GUN General Pubic License),在网上可以通过免费下载获得Snort,并且只需要几分钟就可以安装并开始使用它.snort基于libpcap.-snort
Platform: | Size: 1429504 | Author: 杨强强 | Hits:

[Embeded-SCM Developcontiki_RTOS_V2.4

Description: Contiki is an open source, highly portable, multi-tasking operating system for memory-efficient networked embedded systems and wireless sensor networks. Contiki has been used is a variety of projects, such as road tunnel fire monitoring, intrusion detection, water monitoring in the Baltic Sea, and in surveillance networks.
Platform: | Size: 12615680 | Author: tayfun karan | Hits:

[Windows Developadodb511

Description: IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
Platform: | Size: 693248 | Author: gram | Hits:

[OS programSnort_Source_Analysis

Description: 网络入侵检测软件snort源码分析,主要是对系统初始化,包处理2个阶段代码的详尽解释,对应版本snort2.2。www.skynet.org.cn的Kendo原创。-Snort network intrusion detection software, source code analysis, mainly for system initialization, packet processing stage 2 detailed explanation of the code, the corresponding version of snort2.2. Www.skynet.org.cn of Kendo by the original.
Platform: | Size: 4313088 | Author: lanyu | Hits:

[Otherruqinjiance

Description: 本课程设计是模拟人体的免疫系统,以及人体内B细胞与T细胞的工作原理,使其应用在计算机的入侵检测中,能够深化的检测出网络上有攻击的信息,从而提高系统的自适应性、动态性和准确性,以弥补传统入侵检测技术的不足-This course is designed to simulate the body s immune system, and human B cells and T cells, the body works, its application in computer intrusion detection, to deepen the detection of network attacks on information systems to improve the adaptive , dynamic and accuracy to compensate for the lack of traditional intrusion detection technology
Platform: | Size: 270336 | Author: 梁浩 | Hits:

[AI-NN-PRSIDSfazhaani

Description: 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。 已通过测试。 -Since 1980 to produce the IDS concept, host-based and network-based intrusion detection systems, knowledge-based model identification, anomaly identification and protocol analysis, intrusion detection technology, and on Fast, Gigabit and even more high-traffic network system to perform intrusion detection. Has been tested.
Platform: | Size: 3072 | Author: 面积 | Hits:

[Windows DevelopwJIDDXzipi

Description: windows系统下用java开发发的网络入侵检测程序源码 -Network intrusion detection program source java development issued under the windows system
Platform: | Size: 401408 | Author: 陪同 | Hits:

[Internet-Networkhfile

Description: 入侵检测的代码用于检测系统的后门程序简单易会-intrusion detection code for the rear detection system procedures will be simple and easy
Platform: | Size: 7168 | Author: eofper | Hits:

[SCMCABLE0923

Description: 这是一个地沟电缆防盗报警系统检测单元的汇编程序,主要是检测是否有断线事件、入侵事件,若没有就发送正常标志。-This is a trench cable assembler burglar alarm system detection unit, mainly to detect whether there is disconnection event, intrusion events, if not it sends a normal flag.
Platform: | Size: 6144 | Author: John LONG | Hits:

[Special Effectspaper3

Description: A novel soft computing model using adaptive neuro-fuzzy inference system for intrusion detection
Platform: | Size: 230400 | Author: xiaowang | Hits:

[ERP-EIP-OA-PortalIDS

Description: 基于php的ids入侵检测分析系统,采用smarty模板设计页面。-Php-based ids intrusion detection and analysis system, using smarty template design page.
Platform: | Size: 2324480 | Author: kongjp | Hits:

[Othercommunity-rules

Description: snort规则合集,可以用来设置snort选项,可以实现入侵检测的预警以及防御,进而提高系统的安全性-snort rules collection can be used to set snort options, you can achieve intrusion detection and early warning defense, thus improving system security
Platform: | Size: 163840 | Author: Stefan1111 | Hits:

[Software EngineeringMulti-Agent-Based-IDS-for-WSN

Description: 本文提出一种无线传感器网络入侵检测解决方案针对分簇式无线传感器网络的特点, 通过让节点和簇头分别执行不同检测任务, 结合本地检测和联合检测, 并采用多个代理模块分别实现数据收集、分析检测和入侵响应和代理管理的任务,是一套完整的IDS体系。-This paper proposes a wireless sensor network intrusion detection characteristics solutions cluster wireless sensor network, data collected by the nodes so that each cluster head and perform different detection tasks with local detection and joint detection, and the use of a plurality of modules each agent , analysis, and intrusion detection and response agency management task is a complete IDS system.
Platform: | Size: 263168 | Author: 邵茜 | Hits:

[OS program黑客安全手册-系统维护与渗透 min

Description: 阻止入侵和攻击的主要技术措施包括访问控制技术、防火墙技术、入侵检测技术、安全扫描、安全审计和安全管理。在网络安全整体解决方案日益流行的今天,安全审计是网络安全体系中的一个重要环节。 计算机网络安全审计主要包括对操作系统、数据库、Web、邮件系统、网络设备和防火墙等项目的安全审计,以及加强安全教育,增强安全责任意识。(The main technical measures to prevent intrusion and attack include access control technology, firewall technology, intrusion detection technology, security scanning, security audit and security management. Nowadays, the overall solution of network security is becoming more and more popular. Computer network security audit mainly includes security audit of operating system, database, Web, mail system, network equipment and firewall, as well as strengthening security education and enhancing security responsibility consciousness.)
Platform: | Size: 18331648 | Author: moubenben | Hits:
« 1 2 ... 10 11 12 13 14 15»

CodeBus www.codebus.net