Clustering-based according to the technique advantages of DIDS two techniques is presented For choosing the attacks effectively., twice is the clustering clustering is employed: first to choose the candidate anomalies at the second Agent IDS and choose to attack the clustering is true at last, through central At experiment IDS. on the KDD CUP 1999 data records of network connections verified that the methods put forward is better, click.
การแปล กรุณารอสักครู่..
