搜索资源列表
protocol
- 本文综合了IDS与IPS的特点,将协议分析、网络流量分析与深度包检测技术相结合,提出一个新的网络防御系统一“基于协议分析的网络分布式入侵防御系统(Network Distributed Intrusion Prevention System Base on the Protocol Analysis,NDIPS),同时给出了系统的基本实现,并利用现有仿真条件及网络基 础对部分检测防御技术进行了必要的评测与验证。该系统提高了网络对入侵的实 时阻止能力,提高了网络整体的安全性。-This
kmeanssource
- kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
snort_analysis
- 不错的snort源码分析材料,作者首先介绍了snort原理和架构,然后分析snort源码,对于理解入侵检测很有帮助。-Analysis snort good source material, the author first introduced the principle and structure of snort, and then snort source analysis, intrusion detection helpful for understanding.
LS-SVM
- 基于LS-SVM的入侵检测模型与实时测试平台研究-LS-SVM based intrusion detection model and real-time test platform for research
IDS_of_blackhole_attacksaodv
- Intrusion detection for black hole attack on AODV protocol.
DataCheck
- 入侵检测数据检测算法,根据C4.5源码改编-Intrusion detection data detection algorithm, in accordance with C4.5 source adaptation
ids
- 作者自己修改的一个基于网络的入侵检测系统-The author himself revised a web-based Intrusion Detection System
opnet2002
- Network Intrusion Simulation Using OPNET
svm 入侵检测-1
- 模式识别中的入侵检测算法1,不错的内容啦-pattern recognition of an intrusion detection algorithm, as well--
intrusiondetection
- 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
BP_nids
- 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
lab
- 基于2叉树svm的入侵检测算法,构造偏态二叉-2-tree SVM-based intrusion detection algorithms, binary structure skewness
Snort
- 该文件详细介绍了snort的用法,snort是一个很好用的入侵检测系统。snort有三种工作模式:嗅探器、数据包记录器、网络入侵检测系统。-The open source Snort Intrusion Detection and Prevention system is the most flexible and widely deployed solution available
cnbjn
- 评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学 说和危险模式理论的应用研究现状 -Immunology principle and its application in intrusion detection in recentyearswere reviewed. The research on antibody clonal selection theory, immune networks and danger theorywere emphasi
Apriori
- 关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
2run-30
- 入侵检测算法,计算机常用的工具,聚类分析-Intrusion detection algorithm, commonly used computer tools, cluster analysis
ids
- 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
DataMiningTechniquesfor(Network)Intrusion
- In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In
intrusion-detection
- VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
Intrusion-Detection-System-master
- Intrusion Detection for network security