Description: 集合物体形状/颜色识别功能的全自动安全监视报警器,可以用来检测特定物体是否被移动、或者用于入侵检测等等 -shape/color recognition function of automatic security alarm monitoring device that can be used to determine whether a particular object was moving, or for intrusion detection, etc. Platform: |
Size: 220160 |
Author:姚紫欣 |
Hits:
Description: Deep Network Analyzer(DNA)是一个灵活的,可扩展的深度网络分析器(服务器软件)与框架,它可收集和分析网络数据包,网络对话(sessions)与应用层协议(HTTP,DNS,P2P,VoIP等),被动地隔离企业级网络.DNA主要设计用于Internet安全,入侵探测,网络管理,协议与网络分析,信息搜集,网络监测应用程序.-Deep Network Analyzer (DNA) is a flexible, Depth can be extended network analyzer (server software) and the framework, which will collect and analyze data packet network, Network Dialogue (sessions) and the application layer protocol (HTTP, DNS, P2P, VoIP, etc.), passive isolation enterprise network. DNA designed mainly for Internet security, Intrusion detection, network management, network agreement with the analysis, information gathering, network monitoring applications. Platform: |
Size: 12617728 |
Author:秦宗全 |
Hits:
Description: 通过介绍常用的入侵检测工具snort的配置,基本应用和规则编写,实现简易的入侵检测功能,便于理解入侵检测的基本原理-Introduce the common snort intrusion detection tool configuration, the basic application and rules written in simple intrusion detection features, easy to understand the basic principles of intrusion detection Platform: |
Size: 217088 |
Author:萧一 |
Hits:
Description: 入侵检测的核心技术就是从网络中获取信息,对获取的信息进行分析来进一步判定是否是发生了入侵。 -The core technology of intrusion detection is to obtain information from the network, further analysis of the information obtained to determine whether the invasion occurred. Platform: |
Size: 1593344 |
Author:houying |
Hits:
Description: This paper examines techniques for providing adaptation in
intrusion detection and intrusion response systems Platform: |
Size: 657408 |
Author:ahmed |
Hits:
Description: Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station Platform: |
Size: 646144 |
Author:ahmed |
Hits:
Description: A HoneyPot Network Intrusion Detection System
Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port.
This file came from Planet-Source-Code.com...the home millions of lines of source code Platform: |
Size: 7168 |
Author:sakthivel |
Hits:
Description: In recent years, the needs of the Internet are felt in lives of all people.
Accordingly, many studies have been done on security in virtual environment. Old
technics such as firewalls, authentication and encryption could not provide Internet
security completely; So, Intrusion detection system is created as a new solution and
a defense wall in cyber environment. Many studies were performed on different
algorithms but the results show that using machine learning technics and swarm
intelligence are very effective to reduce processing time and increase accuracy as
well. In this paper, hybrid SVM and ABC algorithms has been suggested to select
features to enhance network intrusion detection and incr Platform: |
Size: 11619328 |
Author:alqatf |
Hits:
Description: 基于kmeans的异常检测算法,数据集是kddcup99(Based on kmeans anomaly detection algorithm, the data set is kddcup99.) Platform: |
Size: 1024 |
Author:mupeieevew |
Hits:
Description: intrusion detection system (IDS) Deep Learning (DL) has emerged as a new approach that delivers higher accuracy than traditional machine learning techniques. DL has the ability to process raw data and learn the high level features on its own, and so DL has a strong case for its adaptability in resource constrained networks like SDNs. Platform: |
Size: 3205378 |
Author:thirumal@techquest.info |
Hits: