龔勇
為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點(diǎn),世界各地的計(jì)算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測系統(tǒng),提高網(wǎng)絡(luò)的安全性。
主題語境:科技與信息 篇幅:314詞 建議用時(shí):7分鐘
1 Networkbasedtechnology has becomeincreasingly widespread, and it is now beingused by countless individuals, professionals, andbusinesses worldwide. Despite the technologysadvantages, most networkbasedsystems arehighly weak to malicious attacks. The consequencesof a malicious attack on networkbasedsystems can be extremely severe and devastating. For instance, an attack on a power utilitynetwork could leave millions of individuals and offices without electricity, while attacks onsocial media networks can lead to the disclosure of user information.
2 To overcome the weaknesses of network?based systems, computer scientists world?wide have been trying to develop advanced intrusion (入侵) detection systems (IDSs)that could help to identify malicious attacks, increasing a network s safety. In recentyears, machine learning (ML) algorithms (算法) have been found to be particularly promisingfor automatically detecting attacks and intrusions on a networks functioning.
3 A key step in the development and training of ML?based IDSs is the selection ofdata features that a model can rely on or focus on when making predictions. Ideally, byanalyzing large datasets, researchers should be able to identify the most suitable featuresfor solving a given task using ML tools, and this is also applicable to intrusion detection.
4 Researchers at Canadian University Dubai in the UAE have recently developed anew feature selection method that could enable the development of more effective MLbasedIDSs. This method, presented in a paper prepublishedon arXiv, was found to perform remarkably well when compared with other commonly employed feature selectiontechniques.“Our goal is to study feature selection in network traffic data with the aim ofdetecting potential attacks,” Firuz Kamalov, Sherif Moussa, Rita Zgheib and OmarMashaal, the researchers who carried out the study, wrote in their paper.“We considervarious existing feature selection methods and propose a new feature selection algorithm toidentify the most effective features in network traffic data.”
Reading Check
1. Whats the function of the two examples mentioned in paragraph 1?
A. To present the power of networkbased systems.
B. To show the weaknesses of networkbased systems.
C. To explain the variety of malicious attacks.
D. To illustrate the serious results of malicious attacks.
2. How do IDSs improve a networks safety?
A. By preventing malicious attacks.
B. By recognizing malicious attacks.
C. By imitating malicious attacks.
D. By devastating malicious attacks.
3. Whats the key to the development of MLbased IDSs?
A. The settlement of tasks.
B. The analysis of datasets.
C. The prediction of the model.
D. The choosing of data features.
Language Study
Ⅰ. Useful expressions
for instance 例如;比如
rely on 依靠;依賴
be able to do 能夠做……
compare with 與……相比較
Ⅱ. Difficult sentences
1. To overcome the weaknesses of networkbasedsystems, computer scientists worldwidehave been trying to develop advanced intrusion detection systems (IDSs) that couldhelp to identify malicious attacks, increasing a networks safety. 為了克服基于網(wǎng)絡(luò)的系統(tǒng)的弱點(diǎn),世界各地的計(jì)算機(jī)科學(xué)家一直在嘗試開發(fā)先進(jìn)的入侵檢測系統(tǒng),這類系統(tǒng)可以幫助識(shí)別惡意攻擊,提高網(wǎng)絡(luò)的安全性。
【點(diǎn)石成金】該句的主干為computer scientists worldwide have been trying to developadvanced intrusion detection systems (IDSs);that could help to identify...safety為that引導(dǎo)的定語從句,修飾先行詞intrusion detection systems,且關(guān)系代詞that在從句中作主語;To overcome...systems為不定式結(jié)構(gòu)作目的狀語。
2. A key step in the development and training of MLbasedIDSs is the selection ofdata features that a model can rely on or focus on when making predictions. 基于機(jī)器學(xué)習(xí)的入侵檢測系統(tǒng)開發(fā)和訓(xùn)練的關(guān)鍵步驟是選擇模型在進(jìn)行預(yù)測時(shí)可以依賴或關(guān)注的數(shù)據(jù)特征。
【點(diǎn)石成金】該句的主干為A key step is the selection of data features;in thedevelopment and training of MLbasedIDSs 為介詞結(jié)構(gòu)作后置定語,修飾A key step;that a model can rely...focus on為that引導(dǎo)的定語從句,修飾先行詞data features,且關(guān)系代詞that在從句中作賓語;when making predictions為when引導(dǎo)的時(shí)間狀語從句的省略形式,省略了主語a model和be動(dòng)詞is。