与此同时,这些重要的信息网络系统面临入侵攻击的威胁,而操作系统和应用服务程序的漏洞正是攻击者实施攻击的基础。
Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
传统的入侵检测方法在面对多变的网络结构时缺乏可扩展性,而且在未知的攻击类型面前也缺乏适应性。
Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.
来自另一家网络安全公司CyberSquared的AdamVincent说,这样(僵尸网络的)形式的攻击真的很难定位到某次入侵的幕后真凶是谁。
Such ploys can make it hard to identify exactly who is behind a particular online assault, says Adam Vincent of Cyber Squared, another security firm.
一旦入侵成功,电脑能够暗中下载其它代码,这些代码会记录入侵电脑的键击数据,这将给攻击者一条潜在宽广网络进入权。
Once so compromised, a computer can surreptitiously download other code that can log a victim's key strokes, giving an attacker a path to potentially wide network access.
测试结果表明,IIDS可以有效地检测出网络的入侵行为,以及未知的攻击模式,达到了预期目标。
The results showed that IIDS can properly detect network intrusion actions and implement the detection to unknown attack modes for the due aim.
任何对该节点的攻击或者与该节点不适当的无线连接都意味着入侵者已深入到网络内部。
Any hacking or improper wireless connectivity to it means that the intruder is deeply in the network.
第二二,当前绝大多数入侵检测产品采用的都是专家系统,但网络攻击手段变化多样,导致误报漏报率太高;
Second, the expert system adopted currently by most intrusion detection products have high false alarm rate because the network attack means change variably.
入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
基于机器学习的入侵检测方法是大规模、高带宽网络环境下实现对网络攻击智能检测的关键技术之一。
Intrusion detection techniques based on machine learning is one of the key technologies to be applied to intelligent intrusion detection under the circumstance of large scale and bandwidth network.
还主要阐述计算机信息网络攻击和入侵的特点、安全因素以及其安全防范手段。
At the same time, the article expounds the features of computer information network being attacked and invaded, security factors and other security precautionary measures.
机体免疫系统的许多有益特性被应用于入侵检测系统,使之能够主动地防御各种各样的网络攻击。
A few useful mechanisms of biological immune system are applied for intrusion detection systems, which makes it possible to initiatively defense a variety of network attacks.
第三章介绍了网络协议基础,常见的攻击方法和原理,入侵检测系统的规范和标准。
Chapter three introduced the foundation of protocols, common attack method and principle, the norms and standards of the intrusion detection system.
而入侵检测领域则涵盖了从框架、抗攻击、高速网络检测到智能化检测等各个方面。
The research on intrusion detection system is involved with many respects, such as framework, defense of attack of IDS, detection on high speed network, intelligent detection.
方面当今社会对网络的依赖性日益增加,而另一方面网络入侵和攻击事件发生的次数也急剧增长。
On the one hand today's society increasingly dependent on networks, network intrusion and attacks the other hand the number of incidents increased sharply.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
针对邮件服务器的攻击可分为网络入侵和服务破坏两种。
The attack that is aimed at mail server can be divided destroy two kinds to the network inbreaks and serve.
它可以帮你抵挡网络入侵和攻击,防止信息泄露,保障用户机器的网络安全。
It can help you ward off network intrusion and attacks, prevent information leakage, protect user machines network security.
随着网络攻击手段的日益复杂化、多样化和自动化,传统的入侵检测系统(IDS)己不能满足安全需求。
With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems (IDS) can't any longer meet the need of security.
此方案主要是通过读取和分析管理信息库中的网络连接信息,针对网络入侵和攻击的特点,来对网络进行监测。
This method monitors the network through reading and analyzing networks connection information in the Management Information Base contradistinguishing the networks invasion and attack characteristic.
网络攻击和入侵事件不断发生,给人们造成了巨大的损失,网络安全问题越来越成为社会关注的热点。
As network attacks and intrusions are constantly emerging and have caused great loss, network security problem has increasingly become a hotspot of social attention.
面对大量网络攻击事件,自动入侵响应系统能够及时采取响应措施阻止攻击的延续并减小系统损失。
With a large number of network attacks, the automated intrusion response system can take timely countermeasures to stop attacks and reduce the loss of system.
为更全面的保护网络不受攻击,入侵检测系统应运而生。
Not attacking for more overall protection network, intrusion detection system will give play to irreplaceable function.
SRX5308是一个完整的安全解决方案保护您的网络攻击和入侵。
The SRX5308 is a complete security solution that protects your network from attacks and intrusions.
入侵检测技术是一种主动保护自己免受黑客攻击的新型网络安全技术。
NID technology is a new net safety technology for self-protection and a system immune from hackers 'attacks.
该文应用SVM的分类特性来识别网络攻击行为,提出了基于SVM的入侵检测方法。
This paper utilizes the classification feature of SVM to recognize intrusion, and gives SVM-based intrusion detection system.
面临着大量的网络入侵事件,该文分析了网络攻击的几种常见手法及防范措施,以供大家参考。
Faced with a large number of network intrusion events, this article analyzes the attacks of several common practices and preventive measures for your reference.
随着网络速度的迅速提高,各种攻击手段的层出不尽,现行网络入侵检测系统(NIDS)很难适应当前高速网络环境而导致大量的漏检现象。
With the rapid improvement of net speed and the emergence of various attacking means, the existing NIDS cannot effectively deal with the missing detective information in high-speed network.
针对数字化校园面临的病毒入侵、黑客攻击和垃圾邮件等一系列网络安全问题。
Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.
针对数字化校园面临的病毒入侵、黑客攻击和垃圾邮件等一系列网络安全问题。
Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.
应用推荐