The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
2
Using this table function instead of db2pd simplifies evaluation of the results because the index IDs (IIDs) can be converted to index names by joining with the SYSCAT.INDEXES catalog view.