首页> 外文期刊>Mechanical Engineering >INFORMATION WATCHDOGS
【24h】

INFORMATION WATCHDOGS

机译:信息看门狗

获取原文
获取原文并翻译 | 示例
           

摘要

If you're worried that computers are unassailable, fear not: It turns out that computers need watchdogs, too. But instead of an angry, barking dog, they depend on programs keyed to troll through important databases to look for suspicious signs of entry. Researchers at Pennsylvania State University have tested and ranked three nonstatistical, data mining methods that classify and detect telltale, patterns of entry and misuse left by typical computer network intruders. The best method the researchers found for foiling computer hackers is called rough sets, although they say that means of protecting networks is largely overlooked by the network-security industry. The researchers say that computer security breaches have risen significantly in the last three years.
机译:如果您担心计算机无懈可击,请不要担心:事实证明,计算机也需要看门狗。但是,它们不是依赖生气的吠叫狗,而是依赖于旨在通过重要数据库浏览的程序来查找可疑的进入迹象。宾夕法尼亚州立大学的研究人员已经对三种非统计数据挖掘方法进行了测试和排名,这些方法可以分类和检测典型计算机网络入侵者的故事,进入模式和滥用行为。研究人员发现的挫败计算机黑客的最佳方法被称为“粗糙集”,尽管他们说,保护网络的方法在很大程度上被网络安全行业所忽视。研究人员说,在过去三年中,计算机安全漏洞已大大增加。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号