宪法诉讼与违宪审查的关系是?
答案:5 悬赏:70
解决时间 2021-02-17 20:39
- 提问者网友:寂寞撕碎了回忆
- 2021-02-17 07:16
宪法诉讼与违宪审查的关系是?
最佳答案
暂无最佳答案
全部回答
- 1楼网友:春色三分
- 2021-02-17 12:23
0 IntroductionW
iththerapiddevelopmentofthenetwork,network basedintrusionsbecomesevererandseverer.Soi
tisimperioustodevelopreliablenetwork basedintrusiondetectionsystem.Sincethedependencebetweend
iversenetworksbecomesevere,itisessentialtoimportdistributedcooperativemechanismintotheIDS,w
hichneedtoexchangecooperativedataamongdifferentdetectionspots.Toensurethereliabilityandcor r
ectnessofcooperation,thetransferofthecooperativedatamustbecarefullycontrolled.Thuscooperatived
etectiontransferisthebaseoftheimplementationofcooperativedetection.Ingeneralitisdividedintotwol
ayers:thelowerlayerisusedtotransferdataandensurethecommunicationchannel ssecurityofdiversec
ooperativespots;whiletheupperlayerusesXMLencodingprogramtoencapsulatethesecurityevents,w
hichisobtainedfromlowerlayer,andprovidestheresultsforcooperativedetectionsystem.U
ntillnowthemostfamousresearchesinnetworksecuritydetectionareCIDF(CommonIntrusionDe t
ectionFramework)whichisheldupbyU.C.DavisandIDMEF(IntrusionDetectionMessageExchangeF
ormat)producedbyIDWG(IntrusionDetectionWorkGroup)ofIETF.Herethedesignofcooperativede t
ectiontransferisbasedonIDWG.I
DWGreleased“draft ietf idwg idxp 01”togiveadetaileddescriptionofIDXP(IntrusionDetectionE
xchangeProtocol)in2001andinthenextyearreleasedthenewestversionof“draft ietf idwg idxp 04”.I
DXPisanapplication levelprotocolforexchangingdatabetweenintrusiondetectionentities.Itsupportsm
utual authentication,integrity,andconfidentialityoveraconnection orientedprotocol.Theprotocolen a
blestheexchangeofIDMEFmessages,unstructuredtext,andbinarydata.Itisindependentfromdatar
epresentationandmakesthedatatransfersafeinhigh speedIPnetwork.HereweuseIDXPasthelower
iththerapiddevelopmentofthenetwork,network basedintrusionsbecomesevererandseverer.Soi
tisimperioustodevelopreliablenetwork basedintrusiondetectionsystem.Sincethedependencebetweend
iversenetworksbecomesevere,itisessentialtoimportdistributedcooperativemechanismintotheIDS,w
hichneedtoexchangecooperativedataamongdifferentdetectionspots.Toensurethereliabilityandcor r
ectnessofcooperation,thetransferofthecooperativedatamustbecarefullycontrolled.Thuscooperatived
etectiontransferisthebaseoftheimplementationofcooperativedetection.Ingeneralitisdividedintotwol
ayers:thelowerlayerisusedtotransferdataandensurethecommunicationchannel ssecurityofdiversec
ooperativespots;whiletheupperlayerusesXMLencodingprogramtoencapsulatethesecurityevents,w
hichisobtainedfromlowerlayer,andprovidestheresultsforcooperativedetectionsystem.U
ntillnowthemostfamousresearchesinnetworksecuritydetectionareCIDF(CommonIntrusionDe t
ectionFramework)whichisheldupbyU.C.DavisandIDMEF(IntrusionDetectionMessageExchangeF
ormat)producedbyIDWG(IntrusionDetectionWorkGroup)ofIETF.Herethedesignofcooperativede t
ectiontransferisbasedonIDWG.I
DWGreleased“draft ietf idwg idxp 01”togiveadetaileddescriptionofIDXP(IntrusionDetectionE
xchangeProtocol)in2001andinthenextyearreleasedthenewestversionof“draft ietf idwg idxp 04”.I
DXPisanapplication levelprotocolforexchangingdatabetweenintrusiondetectionentities.Itsupportsm
utual authentication,integrity,andconfidentialityoveraconnection orientedprotocol.Theprotocolen a
blestheexchangeofIDMEFmessages,unstructuredtext,andbinarydata.Itisindependentfromdatar
epresentationandmakesthedatatransfersafeinhigh speedIPnetwork.HereweuseIDXPasthelower
- 2楼网友:归鹤鸣
- 2021-02-17 11:43
我暂时保留我的看法!
我要举报
如以上问答内容为低俗、色情、不良、暴力、侵权、涉及违法等信息,可以点下面链接进行举报!
大家都在看
推荐资讯