| Along with the network of extensive and applied, especially the government information bring upped the very high request to network safety with the military data. Network attack the method pile up one after another, invade the means to also continuously renew, make now of fire wall etc. passive of the network safety attackstone to lots of difficult then examine. Invade the examination to be used as an active defense technique, and make up the traditional lack of technique safety. Its primarily pass to supervise and control the appearance, customer of the network and system the usage circumstance of the behavior and system, examine the system customer more the power usage and invader make use of the safe blemish to scheme system proceed invade, combine right invade to adopt the measure of the cowgirl. Invade the examination (Intrusion Detection) to point to use to identify to aim at the calculator the system, network the system, or the illegal attack of the system of more extensive information on the meaning. Include the outsider illegal entry of examination of sound out, malice attack, and internal and legal customer of illegal more power behavior. Invade to examine the system research is an application of current network that the research heat of the safe realm point, among them the mode identify and the data scoop outed to wait the technique on invade the examination to get the extensive concern. Artificial nerve the network be used as the important method that identify of mode, and have from the buildup, from the study with expand the ability, artificial nerve network method application in invade to examine in the system, will make the... |