小学、初中、高中各种试卷真题知识归纳文案合同PPT等免费下载www.doc985.com小学、初中、高中各种试卷真题知识归纳文案合同PPT等免费下载www.doc985.com选择性必修第二册Unit4BreakingboundariesⅠ.阅读理解ANetwork-basedtechnologieshavebecomeincreasinglywidespread,andtheyarenowbeingusedbycountlessindividuals,professionals,andbusinessesworldwide.Despitetheiradvantages,mostnetwork-basedsystemsarehighlyatriskofmalicious(恶意的)attacks.Theconsequencesofamaliciousattackonnetwork-basedsystemscanbeextremelyharmful.Forinstance,anattackonapowerplantnetworkcouldleavemillionsofindividualsandofficeswithoutelectricity,whileattacksonsocialmedianetworkscanleadtoexposureofuserinformation.Toovercometheweaknessesofnetwork-basedsystems,computerscientistsworldwidehavebeentryingtodevelopadvancedintrusiondetectionsystems(IDSs)(入侵检测系统)thatcouldhelptoidentifymaliciousattacks,increasinganetwork’ssafety.Inrecentyears,machinelearning(ML)algorithms(机器学习算法)havebeenfoundtobeparticularlypromisingforautomaticallydetectingattacksandintrusionsonanetwork’sfunctioning.AnimportantstepinthedevelopmentandtrainingofML-basedIDSsistheselectionofdatafeaturesthatamodelcanrelyorfocusonwhenmakingpredictions.Ideally,byanalyzinglargedatasets,researchersshouldbeabletoidentifythemostsuitablefeaturesforsolvingagiventaskusingMLtools,andthiscanalsobeappliedtointrusiondetection.ResearchersatCanadianUniversityDubaiintheUAEhaverecentlydevelopedanewfeatureselectionmethodthatcouldenablethedevelopmentofmoreeffectiveML-basedIDSs.Thismethodwasfoundtoperformremarkablywellwhencomparedwithothercommonlyemployedfeatureselectiontechniques.Usingthefeaturestheyidentifiedasmostimportantforintrusiondetection,theresearcherscreatedahighlyefficientML-baseddetectionsystem.ThissystemwasfoundtobecapableofdistinguishingbetweenDDoSattacksandharmlessnetworksignalswith99%accuracy.Inthefuture,thefeatureselectionmethoddevelopedbytheresearchersandtheirfindingscouldhelpthedevelopmentofnew,highlyeffectiveIDSs.Inaddition,thesystemtheycreatedusingthefeaturestheyidentifiedcouldbeappliedinreal-worldsettingstodetectmaliciousattacksonrealnetworks.1.Whatdoesparagraph1focusonaboutnetwork-basedtechnologies?A.Theirtargetedusers.B.Theirpopularity.C.Theirpotentialrisk.D.Theiradvantages.小学、初中、高中各种试卷真题知识归纳文案合同PPT等免费下载www.doc985.com小学、初中、高中各种试卷真题知识归纳文案合同PPT等免费下载www.doc985.com2.HowcanIDSsincreasethesafetyofnetworks?A.Bytrackingmaliciousattacks.B.Bystartinganti-virusprograms.C.Bysortingoutuserinformation.D.Byrecognizingmaliciousattacks.3.WhatisthekeytothedevelopmentofML-basedIDSs?A.Solvinggiventasks.B.Selectingreliabledatafeatures.C.Makingaccuratepredictions.D.Analyzinglargeenoughdatasets.4.What’sthepurposeofthetext?A.TointroduceanewtechniqueforIDSs.B.Topromotenetwork-basedtechnologies.C.Toraisepeople’sawarenessofnetworksafety.D.Todiscusswaystodealwithmaliciousattacks.BBeavers(海狸),likehumans,changetheirsurroundingstofittheirneeds.Knownasnature’sengineers,theyteartreesdowntobuildhomestoliveinanddamstoraisewaterlevelsforprotectionfromenemies.Damsalsoslowwater’sflowwhileblockingsediment(沉积物)thatwouldotherwiseflowdownstream.Theresultingwetlandsoftenattractwildlifediversitywherenonehadexisted.Therearechallenges,though.Beaverdamssometimescauseflooding,andmostpeopleprefertree...