Title: Introduction to Intrusion detection technology time: 2004-06-13 Source: http://www.meiclub.com/Abstract with the development of computer technology, especially network, computer system has been developed from independent host to complex and interconnected open system, This has brought great convenience to people in the use of information and the sharing of resources. At the same time, people are faced with a series of security problems caused b
Target detection is a simple task for a person, but for a computer it sees an array of values of 0~255, making it difficult to directly get a high-level semantic concept for someone or a cat in the image, or the target to eat the area in the image. The target in the image may appear in any position, the shape of the target may have a variety of changes, the background of the image is very different ..., these factors lead to target
The problem at the optical fiber connection is the main cause of network failure. Therefore, the detection of the optical fiber end is crucial. This article discusses three main face detection methods.
The optical fiber end surface processing quality has a great impact on the overall performance of the optical fiber communication system. It is estimated that more than half of the loss in the network is caus
Original sourceThank the Author ~Faster r-cnn:towards Real-time Object Detection with region Proposalnetworksshaoqing Ren, kaiming He, Ross girshick, Jian SuNSummaryAt present, the most advanced target detection network needs to use the region proposed algorithm to speculate on the target location, such as sppnet[7] and fast r-cnn[5] These networks have reduced the running time of the
Author:
Lin shanmao
Status detection firewall is currently the most widely used firewall to protect against hacker attacks. However, as the number of Web attacks targeted at the application layer increases, the effectiveness of the status detection firewall is getting lower and lower in attack protection.
Status detection firewalls are not designed speci
Human body detection using rgb-d dataLucianospinello, Kai O. ArrasSummaryHuman detection is an important problem in robotics and intelligent systems. Previous research was done using cameras and 2D or 3D rangefinder. In this paper, we propose a new method of human body detection using rgb-d. We drew inspiration from hog (histogram of orientedgradients) and design
1. The existence and development inevitability of IDS (Intrusion Detection System) (1) complexity of network security itself, and passive defense methods are not powerful. (2) related firewalls: devices with network boundaries can be attacked by themselves, and some attacks are poorly protected. Not all threats come from outside the firewall. (3) Easy intrusion: Intrusion tutorials can be seen everywhere; various tools are at your fingertips; 2. Intru
1. The existence and development inevitability of IDS (Intrusion Detection System)
(1) The complexity of network security and passive defense methods are insufficient.
(2) related firewalls: devices with network boundaries can be attacked by themselves, and some attacks are poorly protected. Not all threats come from outside the firewall.
(3) Easy intrusion: Intrusion tutorials are everywhere; various tools are at your fingertips
2. Intrusion
With the increase in hacker technology, wireless LAN (WLANs) is under more and more threats. Session hijacking and DoS attacks caused by misconfiguration of wireless base stations (WAPs) affect the security of Wireless LAN. Wireless networks are not only attacked based on the traditional wired network TCP/IP architecture, but may also be threatened by the security issues of the 802.11 standard issued by the Institute of Electrical and Electronics Engineers (IEEE. To better detect and defend agai
Now with the improvement of hacker technology, the wireless local area network (WLANS) is threatened more and more. The failure to configure a wireless base station (WAPS) causes session hijacking and denial of service attacks (Dos) to be like a plague that affects the security of wireless LANs in general. Wireless networks are vulnerable not only to the traditional wired network TCP/IP architecture but also to the security issues of the Institute of Electrical and Electronics Engineers (IEEE) r
Rapid objectdetection using a Boosted Cascade of simple Features fast target detection using the easy feature cascade classifierNote: Some translations are not allowed in a red fontTranslation, Tony,[email protected]Summary:This paper introduces a vision application of machine learning in target detection, which can process images quickly and achieve a higher recognition rate. The success of this work is du
Article Title: perfect solution for using the intrusion detection system in linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Introduction to intrusion detection systems
As more and more companies transfer their core services to the Internet, network security is
sensitive profiles, power through kernel exploits, use scripts that can be invoked by root users under a low-privileged user directory, task scheduling, and so on (from getting started to giving up) (4) Very strong concealment Some malicious web scripts can be nested in a normal web page to run, and not easily be avira. Webshell can also traverse the server firewall, because the data that interacts with the controlled server or remote host is passed through 80 ports, so it is not blocked by the
Webshell detection-Log Analysis
It is always believed that the final meaning of log analysis is evidence collection and prediction-a complete story of ongoing, ongoing, and future attacks (when. where. who. what happened. why ).This article explains how to identify webshell, that is, to trace the attack events that have occurred from the identified attack events. The implanted webshell is undoubtedly a definite attack event, as long as it has been pas
Reprint Please specify source: http://blog.csdn.net/lsh_20131 IntroductionThe edge detection of digital image is an important foundation of image processing such as segmentation, target recognition and region shape extraction. In the image understanding and analysis, the first step is often edge detection. At present, edge Detection has become one of the most act
1. R-cnn:rich feature hierarchies for accurate object detection and semantic segmentationTechnical route: Selective search + CNN + SVMsSTEP1: Candidate Box extraction (selective search)Training: Given a picture, use the Seletive search method to extract 2000 candidate boxes from it. Due to the size of the candidate boxes, considering that the subsequent CNN requires a uniform image size, the 2000 candidate boxes all resize to the 227*227 resolution (i
One of the target detection (traditional algorithm and deep learning source learning)
This series of writing about target detection, including traditional algorithms and in-depth learning methods will involve, focus on the experiment and not focus on the theory, theory-related to see the paper, mainly rely on OPENCV.
First, what is the target detection algorithms
First, Background introductionSkin detection has been widely used in many computer applications such as face recognition and tracking, gesture recognition, image retrieval and classification. The above research topics must solve a fundamental problem, that is, the image is precisely divided into two areas of the skin and background, the accuracy of the division is directly affecting the precision and performance of the follow-up work, so skin
This paper aims at the vulnerabilities of intrusion detection system to understand the hacker's intrusion methods. Once the network intrusion detection system is installed, the network intrusion detection system will analyze the hacker attacks on the Internet, and you can use the counterattack function of this intrusion detec
paper SourcesICCV2017 ARXIV report GitHub code (CAFFE-MATLAB)
The main problem in this paper is pedestrian detection. The author discusses how to apply semantic segmentation to pedestrian detection and improve the detection rate without damaging the detection efficiency. The author proposes a semantic Fusion network (s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.