首页 安全技术 网络攻防     /    基于网络的入侵检测检测系统ids

基于网络的入侵检测检测系统ids

上传者: gp1050900271 | 上传时间:2025/9/20 9:09:03 | 文件大小:1.79MB | 文件类型:rar
基于网络的入侵检测检测系统ids
漏洞扫描,基于网络的入侵检测系统,其中包括端口扫描及漏洞检,是本人毕业设计的作品 异常检测(Anomalydetection)的假设是入侵者活动异常于正常主体的活动。
根据这一理念建立主体正常活动的“活动简档”,将当前主体的活动状况与“活动简档”相比较,当违反其统计规律时,认为该活动可能是“入侵”行为。
异常检测的难题在于如何建立“活动简档”以及如何设计统计算法,从而不把正常的操作作为“入侵”或忽略真正的“入侵”行为。
本软件ID:1813481

文件下载

资源详情

[{"title":"(66个子文件1.79MB)基于网络的入侵检测检测系统ids","children":[{"title":"入侵检测源代码","children":[{"title":"sniffer.rc <span style='color:#111;'>8.20KB</span>","children":null,"spread":false},{"title":"Mprapi.h <span style='color:#111;'>49.26KB</span>","children":null,"spread":false},{"title":"file.cpp <span style='color:#111;'>962B</span>","children":null,"spread":false},{"title":"Ipxtfflt.h <span style='color:#111;'>2.39KB</span>","children":null,"spread":false},{"title":"sniffer.plg <span style='color:#111;'>2.07KB</span>","children":null,"spread":false},{"title":"Ipifcons.h <span style='color:#111;'>13.81KB</span>","children":null,"spread":false},{"title":"sniffer.dsp <span style='color:#111;'>4.37KB</span>","children":null,"spread":false},{"title":"Iprtrmib.h <span style='color:#111;'>21.39KB</span>","children":null,"spread":false},{"title":"StdAfx.cpp <span style='color:#111;'>209B</span>","children":null,"spread":false},{"title":"snifferDlg.cpp <span style='color:#111;'>25.83KB</span>","children":null,"spread":false},{"title":"resource.h <span style='color:#111;'>1.74KB</span>","children":null,"spread":false},{"title":"sniffer.clw <span style='color:#111;'>2.69KB</span>","children":null,"spread":false},{"title":"GzkDlg.cpp <span style='color:#111;'>8.86KB</span>","children":null,"spread":false},{"title":"outFile2.txt <span style='color:#111;'>10B</span>","children":null,"spread":false},{"title":"file.h <span style='color:#111;'>1.21KB</span>","children":null,"spread":false},{"title":"sniffer.h <span style='color:#111;'>1.30KB</span>","children":null,"spread":false},{"title":"sniffer.ncb <span style='color:#111;'>217.00KB</span>","children":null,"spread":false},{"title":"dilg.cpp <span style='color:#111;'>1.11KB</span>","children":null,"spread":false},{"title":"LMcons.h <span style='color:#111;'>7.44KB</span>","children":null,"spread":false},{"title":"IpxConst.h <span style='color:#111;'>2.93KB</span>","children":null,"spread":false},{"title":"Ipxsap.h <span style='color:#111;'>5.53KB</span>","children":null,"spread":false},{"title":"IPHlpApi.h <span style='color:#111;'>14.70KB</span>","children":null,"spread":false},{"title":"AFXSOCK.H <span style='color:#111;'>9.84KB</span>","children":null,"spread":false},{"title":"sniffer.dsw <span style='color:#111;'>520B</span>","children":null,"spread":false},{"title":"sniffer.cpp <span style='color:#111;'>2.03KB</span>","children":null,"spread":false},{"title":"IPExport.h <span style='color:#111;'>7.61KB</span>","children":null,"spread":false},{"title":"IPHlpApi.Lib <span style='color:#111;'>28.78KB</span>","children":null,"spread":false},{"title":"Debug","children":[{"title":"snifferDlg.sbr <span style='color:#111;'>0B</span>","children":null,"spread":false},{"title":"vc60.pdb <span style='color:#111;'>388.00KB</span>","children":null,"spread":false},{"title":"sniffer.res <span style='color:#111;'>3.80KB</span>","children":null,"spread":false},{"title":"vc60.idb <span style='color:#111;'>233.00KB</span>","children":null,"spread":false},{"title":"snifferDlg.obj <span style='color:#111;'>82.91KB</span>","children":null,"spread":false},{"title":"dilg.sbr <span style='color:#111;'>0B</span>","children":null,"spread":false},{"title":"sniffer.bsc <span style='color:#111;'>3.18MB</span>","children":null,"spread":false},{"title":"GzkDlg.sbr <span style='color:#111;'>0B</span>","children":null,"spread":false},{"title":"StdAfx.obj <span style='color:#111;'>108.29KB</span>","children":null,"spread":false},{"title":"sniffer.ilk <span style='color:#111;'>304.64KB</span>","children":null,"spread":false},{"title":"sniffer.exe <span style='color:#111;'>140.06KB</span>","children":null,"spread":false},{"title":"sniffer.obj <span style='color:#111;'>14.45KB</span>","children":null,"spread":false},{"title":"dilg.obj <span style='color:#111;'>10.36KB</span>","children":null,"spread":false},{"title":"StdAfx.sbr <span style='color:#111;'>1.35MB</span>","children":null,"spread":false},{"title":"sniffer.pdb <span style='color:#111;'>337.00KB</span>","children":null,"spread":false},{"title":"sniffer.sbr <span style='color:#111;'>0B</span>","children":null,"spread":false},{"title":"GzkDlg.obj <span style='color:#111;'>43.13KB</span>","children":null,"spread":false}],"spread":false},{"title":"ReadMe.txt <span style='color:#111;'>3.51KB</span>","children":null,"spread":false},{"title":"resource.hm <span style='color:#111;'>163B</span>","children":null,"spread":false},{"title":"Ipxrtdef.h <span style='color:#111;'>10.73KB</span>","children":null,"spread":false},{"title":"StdAfx.h <span style='color:#111;'>1.16KB</span>","children":null,"spread":false},{"title":"IpmcDefs.h <span style='color:#111;'>636B</span>","children":null,"spread":false},{"title":"Ipxrip.h <span style='color:#111;'>5.35KB</span>","children":null,"spread":false},{"title":"sniffer.aps <span style='color:#111;'>37.94KB</span>","children":null,"spread":false},{"title":"_Entryid.h <span style='color:#111;'>2.51KB</span>","children":null,"spread":false},{"title":"outFile1.txt <span style='color:#111;'>17B</span>","children":null,"spread":false},{"title":"dilg.h <span style='color:#111;'>1.23KB</span>","children":null,"spread":false},{"title":"GzkDlg.h <span style='color:#111;'>1.66KB</span>","children":null,"spread":false},{"title":"入侵检测记录.txt <span style='color:#111;'>10.15KB</span>","children":null,"spread":false},{"title":"res","children":[{"title":"sniffer.ico <span style='color:#111;'>1.05KB</span>","children":null,"spread":false},{"title":"sniffer.rc2 <span style='color:#111;'>399B</span>","children":null,"spread":false}],"spread":false},{"title":"Ipinfoid.h <span style='color:#111;'>3.91KB</span>","children":null,"spread":false},{"title":"snifferDlg.h <span style='color:#111;'>3.32KB</span>","children":null,"spread":false},{"title":"sniffer.opt <span style='color:#111;'>55.50KB</span>","children":null,"spread":false},{"title":"捕获数据包记录.txt <span style='color:#111;'>49.45KB</span>","children":null,"spread":false},{"title":"IPTypes.h <span style='color:#111;'>3.16KB</span>","children":null,"spread":false},{"title":"规则库.txt <span style='color:#111;'>51B</span>","children":null,"spread":false},{"title":"IpmConv.h <span style='color:#111;'>2.13KB</span>","children":null,"spread":false},{"title":"mstcpip.h <span style='color:#111;'>870B</span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

  • u012152619:
    少文件啊运行不了2014-03-23
  • 冰河winner:
    少文件啊运行不了2014-03-23
  • ylf326:
    内容很详细2012-07-29
  • ylf326:
    内容很详细2012-07-29

免责申明

【好快吧下载】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【好快吧下载】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【好快吧下载】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,8686821#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明