CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 源码下载 搜索资源 - Anomaly intrusion detection

搜索资源列表

  1. a

    0下载:
  2. 基于C++的网络嗅探器系统的设计与实现 可以进行数据包的解析和了解-Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread and dangerous. The existing signature-based intrusion detection mechanisms are often not sufficient in detecting these types of a
  3. 所属分类:CSharp

    • 发布日期:2017-05-16
    • 文件大小:4345445
    • 提供者:李峥
  1. IDSfazhan

    0下载:
  2. 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。-Since 1980, the concept of generated IDS has been a host-based and network-based intrusion detection system, a model of knowledge-based recognition, ident
  3. 所属分类:Network Security

    • 发布日期:2017-04-13
    • 文件大小:3186
    • 提供者:丝琪儿
  1. p2ptrafficanomalydetection

    0下载:
  2. p2p异常流量检测,基于传输层特征检测,能检测出基本P2P应用所产生的P2P流量-p2p traffic anomaly detection
  3. 所属分类:Network Security

    • 发布日期:2017-04-09
    • 文件大小:1272278
    • 提供者:林若辰
  1. AttacksClassificationinAdaptivIntrusion

    0下载:
  2. Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
  3. 所属分类:Windows Develop

    • 发布日期:2017-03-31
    • 文件大小:312074
    • 提供者:keerthi
  1. protocol_anomaly_detection

    0下载:
  2. This white paper aims at briefly describing the technologies currently used in filter design in Network-based Intrusion Detection System (NIDS). We will consider the advantages and drawbacks of using signature filters versus anomaly filters, an
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-04-02
    • 文件大小:17593
    • 提供者:sinsin
  1. protocol-anomaly-detection-network-based-intrusio

    0下载:
  2. A taxonomy was developed by Axelsson to define the space of intrusion detection technology and classify IDSs. The taxonomy categorizes IDSs by their detection principle and their operational aspects. The two main categories of detection principle
  3. 所属分类:Crypt_Decrypt algrithms

    • 发布日期:2017-03-22
    • 文件大小:83031
    • 提供者:sinsin
  1. Quottection

    0下载:
  2. 商空间粒度聚类的异常入侵检测Quotient space granularity clustering anomaly intrusion detection-Quotient space granularity clustering anomaly intrusion detection
  3. 所属分类:Special Effects

    • 发布日期:2017-04-16
    • 文件大小:392057
    • 提供者:wei
  1. SIDSfazhaani

    0下载:
  2. 自1980年产生IDS概念以来,已经出现了基于主机和基于网络的入侵检测系统,出现了基于知识的模型识别、、异常识别和协议分析等入侵检测技术,并能够对百兆、千兆甚至更高流量的网络系统执行入侵检测。 已通过测试。 -Since 1980 to produce the IDS concept, host-based and network-based intrusion detection systems, knowledge-based model identification, anomaly
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-08
    • 文件大小:3249
    • 提供者:面积
  1. Intrusion-Detection

    0下载:
  2. The problem of intrusion detection has been studied and received a lot of attention in machine learning and data mining in the literature survey. The existing techniques are not effective to improve the classification accuracy and to reduce high
  3. 所属分类:matlab

    • 发布日期:2017-03-26
    • 文件大小:400074
    • 提供者:Sumit
  1. kdd99 Intrusion detection

    0下载:
  2. 基于kmeans的异常检测算法,数据集是kddcup99(Based on kmeans anomaly detection algorithm, the data set is kddcup99.)
  3. 所属分类:其他

    • 发布日期:2018-04-22
    • 文件大小:1024
    • 提供者:mupeieevew
搜珍网 www.dssz.com