3) worm detection

蠕虫检测
1.
P2P worm detection based on traffic classification and application identification;

基于应用识别的P2P蠕虫检测
2.
HPBR:host packet behavior ranking model used in worm detection;

HPBR:用于蠕虫检测的主机报文行为评级模型
3.
Research and implementation of distributed worm detection and active defense system;

分布式蠕虫检测与主动防御系统的研究与实现
4) Worm Detecting

蠕虫检测
1.
The whole system is composed of two parts:Network Admission Control sub-system and Worm Detecting sub-system.
基于SSL安全通信的自防御网络体系主要由两个子系统组成:网络准入子系统和蠕虫检测子系统。
2.
A hardware worm detecting system is given, which is simulated, synthesized and implemented on FPGA, testifying the correctness of the design.
分析了现有的蠕虫检测算法的优缺点,提出了基于数据包统计的蠕虫检测算法。
5) attack detection

攻击检测
1.
Analysis of Distributed denial-of-service attack detection;

分布式拒绝服务攻击检测分析与优化
2.
Application research based on Granger causality test for attack detection;

Granger因果关系检验在攻击检测中的应用研究
3.
This paper combined with the latest research on DDoS attack detection methods,carried on system analysis and research to the DDoS attack detection technique,and compared different methods with each other.
结合DDoS攻击检测方法的最新研究情况,对DDoS攻击检测技术进行系统分析和研究,对不同检测方法进行比较,讨论了当前该领域存在的问题及今后研究的方向。
6) Intrusion detection

攻击检测
1.
The basic theory of database security system is introduced and the techniques and methods to protect database are discussed, including authentication, access control, data encryption, accountability, intrusion detection and data recovery.
首先介绍数据库安全系统的基本理论 ,讨论了保证数据库安全所采取的技术手段和措施 ,包括 :身份认证、存取控制、数据加密、审计跟踪和攻击检测和数据恢复等 。
2.
As a new kind of network security technology, network intrusion detection seeks to detect attacks in an organization s security policy quite simply.
在详细介绍网络攻击检测系统机器学习原理的基础上,对现有的各种方法进行了评述,并结合网络攻击检测系统的应用需求,阐述了网络攻击检测系统机器学习技术的发展方向。
补充资料:蠕虫
蠕虫
无脊椎动物的一大类寄生虫。构造比腔肠动物复杂,身体长形,左右对称,质柔软,没有骨骼,没有肢脚。寄生于人体不同组织器官引起发病。如绦虫、蛔虫、囊虫、血吸虫、姜片虫、华支睾吸虫、包虫、钩虫、蛲虫、丝虫等均属蠕虫。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条