因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
在‘形式分析的承诺’这个小节中讨论了一个攻击流分析阶段的例子。
An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.
文中还结合实验结果对增强剪切攻击鲁棒性的技术进行了分析。
A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.
由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。
Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
病毒就可能通过消磨此类分析器的耐性来攻击该分析。
The virus could attack the analysis by exhausting the patience of such an analyser.
然后,利用数据包捕获机制对攻击数据进行收集、分析和记录。
Then, using packet capture mechanism to attack the data collection, analysis and recording.
第四章简单介绍了当前一个主流的攻击方法—快速相关攻击,并结合熵分析对广义自缩序列的安全性进行了讨论。
In chapter four, a brief review of fast correlation attacks is given, then an attack to generalized self-shrinking sequences is discussed by combining with entropy analysis.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
本文首先对冗余事件的关联特征进行系统的分析,包括攻击类型关联特征、空间关联特征、时间关联特征。
This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.
在描述算法的基础上,给出了实验结果及攻击分析。
Based on the description of the algorithm, experimental results and attack analysis are given.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。
In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
然而,攻击建模和威胁分析工具方面的研究仍处于摸索阶段。
However, insider attack modeling and threat analysis tools have not been evolved at the same rate.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。
To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
最后给出了对该类方案的已知明文的同态攻击方法,弥补了该类方案理论分析上的不足。
Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.
本文对ARP病毒的攻击原理做了详细的探讨和分析。
This article has made the detailed discussion and the analysis to the ARP virus's attack principle.
本文从计算机病毒及木马的起源及现状的分析开始着手,对上百种流行木马的常见攻击手段进行追踪分析,从中寻求其相似性。
This paper begins with the analysis of the origin and status of the Trojan viruses, then tracks and analyzes hundreds of popular Trojan common attack means to seek their similarity.
后来我们将分析其对人体的攻击方法。
Later we will analysis the method of its attack on the human body.
由于功耗分析实现简单,成功率高等优点,成为最具威胁的旁路攻击方法之一。
The power analysis attack is simple and has a high successful rate, is becoming one of the most effective side channel attacking methods.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
应用推荐