搜索资源列表
snort_analysis
- 不错的snort源码分析材料,作者首先介绍了snort原理和架构,然后分析snort源码,对于理解入侵检测很有帮助。-Analysis snort good source material, the author first introduced the principle and structure of snort, and then snort source analysis, intrusion detection helpfu
ruqinjiancejishu
- 优秀本科毕业论文-有关于入侵检测系统方面的-Outstanding undergraduate thesis- on the intrusion detection systems
LS-SVM
- 基于LS-SVM的入侵检测模型与实时测试平台研究-LS-SVM based intrusion detection model and real-time test platform for research
BP_nids
- 基于改进BP算法的入侵检测神经网络方法,很好的一片学习文章,提供了一个模型-Algorithm Based on Improved BP Neural Network Method for Intrusion Detection, learn a very good article, provides a model
DataCheck
- 入侵检测数据检测算法,根据C4.5源码改编-Intrusion detection data detection algorithm, in accordance with C4.5 source adaptation
lab
- 基于2叉树svm的入侵检测算法,构造偏态二叉-2-tree SVM-based intrusion detection algorithms, binary structure skewness
Snort
- 该文件详细介绍了snort的用法,snort是一个很好用的入侵检测系统。snort有三种工作模式:嗅探器、数据包记录器、网络入侵检测系统。-The open source Snort Intrusion Detection and Prevention system is the most flexible and widely deployed solution available
cnbjn
- 评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学 说和危险模式理论的应用研究现状 -Immunology principle and its application in intrusion detection in recentyearswere reviewed. The research on antibody clonal selection theory, immune networks
Apriori
- 关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前
2run-30
- 入侵检测算法,计算机常用的工具,聚类分析-Intrusion detection algorithm, commonly used computer tools, cluster analysis
IDS_of_blackhole_attacksaodv
- Intrusion detection for black hole attack on AODV protocol.
ids
- 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
ch1
- 酒店管理IDS(Intrusion Detection System)就是入侵检测系统,它通过抓取网络上的所有报文,分析处理后,报告异常和重要的数据模式和行为模式,使网络安全管理员清楚地了解网络上发生的事件,并能够采取行动阻止可能的破坏-csharp develop based on asp.net
kmeanssource
- kmeans程序,用以各种方面聚类分析,诸如入侵检测和图像等。-kmeans method,used in many fields, such as intrusion detection, imag segmentation and etc.
CVE_intrusion
- 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统
104
- This an intrusion detection code. I hope this will help people doing work in IDS with secure aodv-This is an intrusion detection code. I hope this will help people doing work in IDS with secure aodv..
opnet2002
- Network Intrusion Simulation Using OPNET
192010k-average
- kmeans均值聚类算法:一种改进的基于半监督聚类的入侵检测算法ASCID(Active-learning Semi-supervised Clustering Intrusion Detection),-kmeans clustering algorithm Algorithm was simulated by KDD 99 datasets, which the experimental results demonstrate
81404566ssl_survey
- 基于半监督学习的入侵检测技术研究 聚类程序- Intrusion Detection Algorithm Based on semi-supervised learning
AttackMoniter
- 这是一个网络入侵检测的系统,喜欢网络安全的朋友可以用来学习一下,希望大家一起进步-This is a network intrusion detection systems, like network security can be used to study how a friend I hope everyone progress