Welcome![Sign In][Sign Up]
Location:
Search - network Intrusion Detection system

Search list

[Linux-Unixrkhunter-1.3.2.tar

Description: 在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.-rootkit for linux
Platform: | Size: 269312 | Author: kkk | Hits:

[Scannersnort-sort

Description: 入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whether the network or system in violation of security policy behavior and indications of attack
Platform: | Size: 2048 | Author: liyabin | Hits:

[Internet-Networksnort_2.2

Description: Snort已发展成为一个多平台(Multi-Platform),实时(Real-Time)流量分析,网络IP数据包(Pocket)记录等特性的强大的网络入侵检测/防御系统(Network Intrusion Detection/Prevention System),即NIDS/NIPS.Snort符合通用公共许可(GPL——GUN General Pubic License),在网上可以通过免费下载获得Snort,并且只需要几分钟就可以安装并开始使用它.snort基于libpcap.-snort
Platform: | Size: 1429504 | Author: 杨强强 | Hits:

[Crack Hackprotocol_anomaly_detection

Description: This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters versus anomaly filters, and more particularly protocol anomaly filters. This is the result of research work done at Defcom Sweden, Stockholm.
Platform: | Size: 17408 | Author: sinsin | Hits:

[OS programdatamining

Description: 回顾了网络安全技术的发展过程,论述了入侵检测的基本概念、 检测模式,以及入侵检测的通用模型,及其相关算法的研究现状:总结了现有 入侵检测系统的不足-Reviewed the development of network security technology De, intrusion detection discussed the basic concepts, detection mode, and intrusion detection general model Jiqixiangguan optimization algorithms: summary of the intrusion detection system Buzu Xianyou
Platform: | Size: 1984512 | Author: shenren | Hits:

[Windows Developadodb511

Description: IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
Platform: | Size: 693248 | Author: gram | Hits:

[OS programSnort_Source_Analysis

Description: 网络入侵检测软件snort源码分析,主要是对系统初始化,包处理2个阶段代码的详尽解释,对应版本snort2.2。www.skynet.org.cn的Kendo原创。-Snort network intrusion detection software, source code analysis, mainly for system initialization, packet processing stage 2 detailed explanation of the code, the corresponding version of snort2.2. Www.skynet.org.cn of Kendo by the original.
Platform: | Size: 4313088 | Author: lanyu | Hits:

[Internet-Networkids

Description: 入侵检测系统是通过诸如,数据审计,网络报文分析等手段,检测各种入侵行为,保证网络安全。英文是intrusion detection system (IDS)。 -Intrusion detection system is through such, data auditing, network packet analysis tools, all kinds of intrusion detection to ensure network security. English is the intrusion detection system (IDS).
Platform: | Size: 45056 | Author: dcs | Hits:

[Exploitprotocol

Description: 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基 础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实 时阻止能力,提高了网络整体的安全性。-This combination of IDS and IPS features, the protocol analysis, network traffic analysis and deep packet inspection technology, to propose a new network defense system a " protocol analysis of network-based distributed intrusion prevention system (Network Distributed Intrusion Prevention System Base on the Protocol Analysis, NDIPS), also gives a basic implementation of the system and the simulation conditions and the use of existing network infrastructure technology for detection and prevention on the part of the necessary evaluation and verification. The system is to improve the network in real time to prevent the invasion ability of and improve overall network security.
Platform: | Size: 4255744 | Author: sdjgkj | Hits:

[Internet-NetworkNIDS

Description: 一个基于网络的入侵检测系统,希望对大家的学习有所帮助-A network-based intrusion detection system, we want to help learning
Platform: | Size: 14880768 | Author: | Hits:

[Otherruqinjiance

Description: 本课程设计是模拟人体的免疫系统,以及人体内B细胞与T细胞的工作原理,使其应用在计算机的入侵检测中,能够深化的检测出网络上有攻击的信息,从而提高系统的自适应性、动态性和准确性,以弥补传统入侵检测技术的不足-This course is designed to simulate the body s immune system, and human B cells and T cells, the body works, its application in computer intrusion detection, to deepen the detection of network attacks on information systems to improve the adaptive , dynamic and accuracy to compensate for the lack of traditional intrusion detection technology
Platform: | Size: 270336 | Author: 梁浩 | Hits:

[AI-NN-PRSIDSfazhaani

Description: 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。 已通过测试。 -Since 1980 to produce the IDS concept, host-based and network-based intrusion detection systems, knowledge-based model identification, anomaly identification and protocol analysis, intrusion detection technology, and on Fast, Gigabit and even more high-traffic network system to perform intrusion detection. Has been tested.
Platform: | Size: 3072 | Author: 面积 | Hits:

[Windows DevelopwJIDDXzipi

Description: windows系统下用java开发发的网络入侵检测程序源码 -Network intrusion detection program source java development issued under the windows system
Platform: | Size: 401408 | Author: 陪同 | Hits:

[ExploitFUZZY-COGNITIVE-MAPS-FOR-DECISION-SUPPORT-IN-AN.r

Description: The “health” of a computer network needs to be assessed and protected in much the same manner as the health of a person. The task of an intrusion detection system is to protect a computer system by detecting and diagnosing attempted breaches of the integrity of the system
Platform: | Size: 425984 | Author: ahmed | Hits:

[OS programidsr

Description: An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.
Platform: | Size: 280576 | Author: Guru | Hits:

[Internet-NetworkSnort_2_9_1_1_Installer

Description: 轻量级入侵检测系统,为网络安全发烧友提供强大的安全防护-Lightweight intrusion detection system that provides strong security protection for network security enthusiasts! ! !
Platform: | Size: 3488768 | Author: academos | Hits:

[Windows Developsnortrules-snapshot-2955.tar

Description: 入侵检测是指对入侵行为的发现、报警和响应,它通过对计算机网络或计算机系统中的若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象。入侵检测系统(intrusion detection system,IDS)是完成入侵检测功能的硬件的软件和集合。-Intrusion detection is refers to intrusion detection, alarm and response, it through the computer network or computer system some key points in gathering information and carries on the analysis, found in the network or system whether there is a violation of security policy and the signs of being attacked. Intrusion detection system (intrusion detection system, IDS) is a complete set of software, and intrusion detection function of the hardware.
Platform: | Size: 22725632 | Author: 杜伟 | Hits:

[Otherourpaper

Description: To Improve Security in Cloud Computing with Intrusion detection system using Neural Network-To Improve Security in Cloud Computing with Intrusion detection system using Neural Network
Platform: | Size: 188416 | Author: sdswd | Hits:

[Internet-NetworkRUQINJIANCE

Description: 入侵检测系统将收集到的信息加以分析,判断网络中是否有违反安全策略的行为和遭到攻击的迹象,若找到入侵痕迹,认为与正常行为相符合的行为是正常行为,与攻击行为相符合的是入侵行为。-Information collected intrusion detection system to be analyzed to judge whether there is a network behavior and security policy violations were signs of attack, if found traces of the invasion, considered normal behavior consistent behavior is normal behavior, and aggressive behavior consistent the intrusion.
Platform: | Size: 3044352 | Author: 哀伤肖兆紫的猫 | Hits:

[Software EngineeringMulti-Agent-Based-IDS-for-WSN

Description: 本文提出一种无线传感器网络入侵检测解决方案针对分簇式无线传感器网络的特点, 通过让节点和簇头分别执行不同检测任务, 结合本地检测和联合检测, 并采用多个代理模块分别实现数据收集、分析检测和入侵响应和代理管理的任务,是一套完整的IDS体系。-This paper proposes a wireless sensor network intrusion detection characteristics solutions cluster wireless sensor network, data collected by the nodes so that each cluster head and perform different detection tasks with local detection and joint detection, and the use of a plurality of modules each agent , analysis, and intrusion detection and response agency management task is a complete IDS system.
Platform: | Size: 263168 | Author: 邵茜 | Hits:
« 1 2 3 4 5 67 »

CodeBus www.codebus.net