• It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.

    分析引擎使用协议分析模式匹配结合检测方法以及改进了的匹配算法提高检测速度

    youdao

  • To solve the problem of Session Initiation Protocol(SIP) traversing Network Address Translator(NAT), this paper describes a new method based on port detection.

    针对会话发起协议SIP穿越网络地址转换NAT问题提出基于端口探测的解决方案。

    youdao

  • The network protocol analysis is an essential technique in network intrusion detection.

    网络协议分析网络入侵检测中的一项关键技术

    youdao

  • In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.

    本文揭示了模式匹配技术弱点分析一种新的、有效检测方法协议分析技术

    youdao

  • This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    本文分析ARP协议及其工作原理现有的ARP欺骗攻击防御方法以及防御检测特点。

    youdao

  • By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.

    通过分析各种入侵检测技术我们入侵检测引擎的实现过程中采用了协议分析命令解析以及分析统计方法

    youdao

  • This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.

    该文安全路由协议基础针对流量模式攻击提出一种基于数据链路监视攻击检测机制

    youdao

  • On another hand, fault-tolerant mechanism depends on the quick detection of node failure, node failure detection is always performed by heartbeat protocol.

    一方面,集群操作系统的容错机制依赖节点失效快速检测,节点失效检测通常心跳协议来完成

    youdao

  • Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.

    对于获得的数据分析模块采用多种方式综合分析入侵行为包括协议分析、专家系统应用数据还原、入侵检测等技术

    youdao

  • Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.

    基于网络入侵检测系统根据网络流量、网络数据包协议分析检测入侵。

    youdao

  • Using route option and TTL field of IP protocol, have implemented network topology structure detection.

    利用IP协议路由选项TTL字段进行探测网络拓扑结构的实践。

    youdao

  • Participation in the overall program requirement analysis, monitoring center, protocol analysis module, flow filtration module, intrusion detection module analysis and design.

    参与整体方案需求分析进行监控中心协议分析模块过滤模块、入侵检测模块的分析设计

    youdao

  • The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.

    网闸所采用的技术包括数据分片重组协议转化密码学入侵检测病毒以及关键字过滤身份验证审核

    youdao

  • Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.

    通过构建检测系统模块测试,可以看到该协议确实达到了预期目的:安全性灵活性有效性

    youdao

  • Using a simple protocol, intact genomic DNA can be obtained for SCAR detection. This method does not use organic solvents and centrifuge equipment.

    一种简单方法,无需接触有毒的有机试剂,无需离心,即可从小麦叶片中提取完整基因组DNA ,质量满足SCAR检测的要求。

    youdao

  • A fire-detection system is introduced for intellective building based on the controller area network(CAN), with the designs of network protocol, hardware and software.

    提出基于CAN总线智能大厦火灾检测系统给出了系统的网络协议硬件以及软件设计方案。

    youdao

  • Compared with other address auto-configuration protocols, this protocol assigns unique address to node rapidly without performing duplicate address detection. So the overhead is very low.

    其他地址自动配置协议相比本文提出的策略可以快速完成地址配置,需要进行重复地址检测开销很少。

    youdao

  • Various types of border collision bifurcations occurring in a discrete feedback transmission control protocol-random early detection (TCP-RED) system are analyzed based on normal form method.

    结合范式方法对传输控制协议和随机早期检测(TCP -RED)离散反馈系统出现不同种类边界碰撞分岔现象进行了分析。

    youdao

  • Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.

    无线异构网络中的关键安全技术包括安全路由协议接入认证技术入侵检测技术节点协作通信

    youdao

  • The updated anti-cheating measures in MMOG are cheat-proofing protocol and cheat-detection algorithm.

    MMOG现有的反欺骗策略主要防欺骗协议和欺骗检测两种。

    youdao

  • And according to Protocol Analysis detection, it can flag the anomaly traffic, and detect some attack variations, and resist attackers' obfuscation attempts.

    利用协议分析技术发现网络中的异常报文,标识出未知攻击,发现攻击者使用的躲避技术变种攻击。

    youdao

  • Objectives: to establish a method of telomere repeat amplification protocol (TRAP) silver stain technique, and to investigate the significance of telomerase activity detection in tumor diagnosis.

    目的建立重复序列扩增(TRAP)-银染色技术探讨活性检测肿瘤诊断中的意义

    youdao

  • The fault detection mechanism of existing topology-aware ALM protocol is very simple which greatly weakens its performance.

    现有拓扑感知应用层组播中的故障检测机制极其简单大大削弱了拓扑感知应用层组播的系统性能。

    youdao

  • Here we present the results of the study on the detection of Influenza virus in the ambient air contaminated with high concentrations of bacteria and fungi using real-time PCR protocol.

    本篇中成功于一高浓度细菌真菌大气环境建立侦测流感病毒之技术。

    youdao

  • Here we present the results of the study on the detection of Influenza virus in the ambient air contaminated with high concentrations of bacteria and fungi using real-time PCR protocol.

    本篇中成功于一高浓度细菌真菌大气环境建立侦测流感病毒之技术。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定