搜索资源列表
network-progress-detect
- 网络入侵检测系统,很经典,仅供学习,如有商业行为,请与本人联系-network intrusion detection systems, classic, for the sole purpose of learning, if commercial activities, please contact I
opnet2002
- Network Intrusion Simulation Using OPNET
intrusiondetection
- 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
BP_nids
- 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
Apriori
- 关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
2run-30
- 入侵检测算法,计算机常用的工具,聚类分析-Intrusion detection algorithm, commonly used computer tools, cluster analysis
ids
- 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
AttackMoniter
- 这是一个网络入侵检测的系统,喜欢网络安全的朋友可以用来学习一下,希望大家一起进步-This is a network intrusion detection systems, like network security can be used to study how a friend I hope everyone progress
fwmon-1.0.9.tar
- firestorm是一个高性能网络入侵检测系统(NIDS)。目前它只有一个传感器,但计划是包括 支持实时分析、报告、远程控制台和快速切换传感器 配置。支持即插即用,非常灵活。执行效率很多比我测试过的其他系统(如如Snort和prelude)高一倍-Firestorm is an extremely high performance network intrusion detection system (NIDS). At the moment it just a sensor but
yuanma
- 《网络安全编程技术与实例》配套源代码 本书详细讲述了重要的网络安全技术原理,并进行了编程实现,涉及的技术有网络安全扫描、网络协议分析、网络数据包生成、网络入侵检测。全书使用Visual C++编程,程序实例丰富,讲解透彻,源代码注释清晰,容易理解。读者可在www.cmpbook.com下载源代码。 本书供网络安全研究和开发人员以及网络安全爱好者阅读,也可以作为计算机网络和网络安全专业方面的教学参考书。 -" Network security programming techniq
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
DataMiningTechniquesfor(Network)Intrusion
- In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In
General_neural_network_of_clustering_algorithm
- 模糊聚类虽然能够对数据聚类挖掘,但是由于网络入侵特征数据维数较多,不同入侵类别间的数据差别较小,不少入侵模式不能被准确分类。本案例采用结合模糊聚类和广义神经网络回归的聚类算法对入侵数据进行分类。 -Although fuzzy clustering to cluster the data mining, but the characteristics of the network intrusion data more dimensions, different invasion was l
Client
- I need Network intrusion detection source code in C sharp
Kohonen-network-clustering-algorithm
- kohonen网络的聚类算法—网络入侵聚类-Kohonen network clustering algorithm, clustering network intrusion
intrusion-detection
- VC编写的基于winpcap的网络入侵检测源代码,实现网络数据包的捕获和分析,根据过滤规则对网络进行过滤-The winpcap based on VC write network intrusion detection the source code, and the realization of the network packet capture and analysis, according to filter rules network filter
Network-intrusion-clustering
- 这是一个用于对网络入侵数据进行分类的程序,具有非常好的聚类效果。-This is a data classification procedure for the network intrusion , it has very good cluster results
Network-intrusion
- kohonen网络的聚类算法,网络入侵聚类,matlab的经典算法- kohonen网络的聚类算法,网络入侵聚类,matlab的经典算法 Clustering algorithm of Kohonen network, the network intrusion clustering, matlab algorithm
A-HoneyPot-Network-Intrusion-Detection-System
- A HoneyPot Network Intrusion Detection System Descr iption: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes p
network-clustering-network-intrusion
- 基于PCA有监督kohonen网络的网络入侵聚类。里面包含有原代码和说明文件。-Based on PCA supervised kohonen network clustering network intrusion