intrusion detection

collocation in English

meaningsofintrusionanddetection

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withdetectionorintrusion.
intrusion
noun[C or U]
uk
/ɪnˈtruː.ʒən/
us
/ɪnˈtruː.ʒən/
an occasion when someone goes into a place or situation where they are not wanted or expected ...
See more atintrusion
detection
noun[U]
uk
/dɪˈtek.ʃən/
us
/dɪˈtek.ʃən/
the fact of noticing or ...
See more atdetection

(Definition ofintrusionanddetectionfrom theCambridge English Dictionary© Cambridge University Press)

Examplesofintrusion detection

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The inner fence is equipped with a perimeterintrusiondetectionsystem and a road for patrol vehicles runs along the outer fence.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
When using shellcode to exploit programs, it can be caught byintrusiondetectionsystems.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
We are exploring the use of fuzzy data mining and concepts introduced by the semantic web to operate in synergy to perform distributedintrusiondetection.
From theCambridge English Corpus
Moreover, specifying an ontological representation decouples the data model defining an intrusion from the logic of theintrusiondetectionsystem.
From theCambridge English Corpus
There are numerous attack taxonomies proposed for use inintrusiondetectionresearch.
From theCambridge English Corpus
There is little, if any, published research formally defining ontologies for use inintrusiondetection.
From theCambridge English Corpus
It should be noted that anintrusiondetectionsystem running exclusively at either host will not detect this multi-phased and distributed attack.
From theCambridge English Corpus
Allen et al. state thatintrusiondetectionis an immature discipline and has yet to establish a commonly accepted framework.
From theCambridge English Corpus
The overarching philosophy drivingintrusiondetectionis that, due to their static nature, intrusion prevention techniques such as firewalls and routing filter policies fail to stop many types of attack.
From theCambridge English Corpus
In applying ontologies to the problem ofintrusiondetection, the power and utility of the ontology is not realised by the simple representation of the attributes of the attack.
From theCambridge English Corpus
Undercoffer et al. address the problem ofintrusiondetectionin networks and the use of ontologies and logical reasoning methods in order to solve this problem more effectively.
From theCambridge English Corpus
Another critical security measure utilised by several regional and international airports is the use of fiber optic perimeterintrusiondetectionsystems.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Investigators often only have material to examine if packet filters, firewalls, andintrusiondetection systems were set up to anticipate breaches of security.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Intrusiondetectionsystems are often repetitive and can be avoided by anticipating their predictable patterns.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It has experimentally been shown to work very well in numerous setups, often outperforming the competitors, for example in networkintrusiondetection.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Other security services are included by default as well, such asintrusiondetection, anti-virus, network management and auditing and reporting tools.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The main differences are, unlikeintrusiondetectionsystems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Honeynets and honeypots are usually implemented as parts of larger networkintrusiondetectionsystems.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
It can be used as an audit tool and a hostintrusiondetectionsystem tool.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
For example,intrusiondetectionsoftware is tested using synthetic data.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Ongoing research in integrity andintrusiondetectionpromise to fill some of this gap.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The log can double asintrusiondetectiontool, logging all accesses including illegal access attempts.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofintrusion
Go to the definition ofdetection
See other collocations withdetection
See other collocations withintrusion