The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology

A classified computer network is vulnerable to external and internal attacks in the Internet environment. It is difficult to get a lot of training sample of the security computer network system at the actual situation. This paper aimed to analyze the security of the computer network under the distributed intrusion detection. We studied how to increase the intrusion detection accuracy in the cas...

متن کامل

A hybrid intrusion detection system design for computer network security

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known a...

متن کامل

the role of task-based techniques on the acquisition of english language structures by the intermediate efl students

this study examines the effetivenss of task-based activities in helping students learn english language structures for a better communication. initially, a michigan test was administered to the two groups of 52 students majoring in english at the allameh ghotb -e- ravandi university to ensure their homogeneity. the students scores on the grammar part of this test were also regarded as their pre...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2014

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2014.8.6.17