intrusion detection
collocation in Englishmeaningsofintrusionanddetection
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withdetectionorintrusion.
intrusion
noun[C or U]
uk/ɪnˈtruː.ʒən/us/ɪnˈtruː.ʒən/
an occasion when someone goes into a place or situation where they are not wanted or expected ...
See more atintrusion
detection
noun[U]
uk/dɪˈtek.ʃən/us/dɪˈtek.ʃən/
the fact of noticing or ...
See more atdetection
(Definition ofintrusionanddetectionfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofintrusion detection
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
The inner fence is equipped with a perimeterintrusiondetectionsystem and a road for patrol vehicles runs along the outer fence.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
When using shellcode to exploit programs, it can be caught byintrusiondetectionsystems.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
We are exploring the use of fuzzy data mining and concepts introduced by the semantic web to operate in synergy to perform distributedintrusiondetection.
From theCambridge English Corpus
Moreover, specifying an ontological representation decouples the data model defining an intrusion from the logic of theintrusiondetectionsystem.
From theCambridge English Corpus
There are numerous attack taxonomies proposed for use inintrusiondetectionresearch.
From theCambridge English Corpus
There is little, if any, published research formally defining ontologies for use inintrusiondetection.
From theCambridge English Corpus
It should be noted that anintrusiondetectionsystem running exclusively at either host will not detect this multi-phased and distributed attack.
From theCambridge English Corpus
Allen et al. state thatintrusiondetectionis an immature discipline and has yet to establish a commonly accepted framework.
From theCambridge English Corpus
The overarching philosophy drivingintrusiondetectionis that, due to their static nature, intrusion prevention techniques such as firewalls and routing filter policies fail to stop many types of attack.
From theCambridge English Corpus
In applying ontologies to the problem ofintrusiondetection, the power and utility of the ontology is not realised by the simple representation of the attributes of the attack.
From theCambridge English Corpus
Undercoffer et al. address the problem ofintrusiondetectionin networks and the use of ontologies and logical reasoning methods in order to solve this problem more effectively.
From theCambridge English Corpus
Another critical security measure utilised by several regional and international airports is the use of fiber optic perimeterintrusiondetectionsystems.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Investigators often only have material to examine if packet filters, firewalls, andintrusiondetection systems were set up to anticipate breaches of security.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Intrusiondetectionsystems are often repetitive and can be avoided by anticipating their predictable patterns.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It has experimentally been shown to work very well in numerous setups, often outperforming the competitors, for example in networkintrusiondetection.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Other security services are included by default as well, such asintrusiondetection, anti-virus, network management and auditing and reporting tools.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The main differences are, unlikeintrusiondetectionsystems, intrusion prevention systems are placed in-line and are able to actively prevent/block intrusions that are detected.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Honeynets and honeypots are usually implemented as parts of larger networkintrusiondetectionsystems.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
It can be used as an audit tool and a hostintrusiondetectionsystem tool.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
For example,intrusiondetectionsoftware is tested using synthetic data.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Ongoing research in integrity andintrusiondetectionpromise to fill some of this gap.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The log can double asintrusiondetectiontool, logging all accesses including illegal access attempts.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofintrusion
Go to the definition ofdetection
See other collocations withdetection
See other collocations withintrusion