It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.
分析引擎使用了协议分析和模式匹配相结合的检测方法以及改进了的匹配算法,提高了检测速度。
To solve the problem of Session Initiation Protocol(SIP) traversing Network Address Translator(NAT), this paper describes a new method based on port detection.
针对会话发起协议(SIP)穿越网络地址转换(NAT)的问题,提出一种基于端口探测的解决方案。
The network protocol analysis is an essential technique in network intrusion detection.
网络协议分析是网络入侵检测中的一项关键技术。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.
本文分析了ARP协议及其工作原理和现有的ARP欺骗攻击的防御方法以及防御和检测特点。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.
该文在安全路由协议的基础上,针对流量模式类攻击,提出一种基于数据链路监视的攻击检测机制。
On another hand, fault-tolerant mechanism depends on the quick detection of node failure, node failure detection is always performed by heartbeat protocol.
另一方面,集群操作系统的容错机制依赖于节点失效的快速检测,节点失效检测通常由心跳协议来完成。
Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Using route option and TTL field of IP protocol, have implemented network topology structure detection.
利用IP协议路由选项和TTL字段,进行了探测网络拓扑结构的实践。
Participation in the overall program requirement analysis, monitoring center, protocol analysis module, flow filtration module, intrusion detection module analysis and design.
参与整体方案需求分析,进行监控中心、协议分析模块、流过滤模块、入侵检测模块的分析与设计。
The technology adopted include categories of data fragment reassembly, protocol conversion, cryptography, intrusion detection, virus, and keyword filtering, authentication and audit and so on.
网闸所采用的技术包括数据分片重组、协议转化、密码学、入侵检测、病毒以及关键字过滤、身份验证及审核等。
Tests basing on the modules of detection system constructed in this thesis show that the expected security, flexibility and effectiveness are achieved in the protocol.
通过构建的检测系统模块测试,可以看到该协议确实达到了预期目的:安全性、灵活性和有效性。
Using a simple protocol, intact genomic DNA can be obtained for SCAR detection. This method does not use organic solvents and centrifuge equipment.
用一种简单的方法,无需接触有毒的有机试剂,无需离心,即可从小麦叶片中提取完整的基因组DNA ,质量满足SCAR检测的要求。
A fire-detection system is introduced for intellective building based on the controller area network(CAN), with the designs of network protocol, hardware and software.
提出了一种基于CAN总线的智能大厦火灾检测系统,给出了该系统的网络协议、硬件以及软件设计方案。
Compared with other address auto-configuration protocols, this protocol assigns unique address to node rapidly without performing duplicate address detection. So the overhead is very low.
与其他地址自动配置协议相比,本文提出的策略可以快速完成地址配置,不需要进行重复地址检测,开销很少。
Various types of border collision bifurcations occurring in a discrete feedback transmission control protocol-random early detection (TCP-RED) system are analyzed based on normal form method.
结合范式方法对传输控制协议和随机早期检测(TCP -RED)离散反馈系统中出现的不同种类的边界碰撞分岔现象进行了分析。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
The updated anti-cheating measures in MMOG are cheat-proofing protocol and cheat-detection algorithm.
MMOG中现有的反欺骗策略主要有防欺骗协议和欺骗检测两种。
And according to Protocol Analysis detection, it can flag the anomaly traffic, and detect some attack variations, and resist attackers' obfuscation attempts.
利用协议分析技术发现网络中的异常报文,标识出未知攻击,发现攻击者使用的躲避技术和变种攻击。
Objectives: to establish a method of telomere repeat amplification protocol (TRAP) silver stain technique, and to investigate the significance of telomerase activity detection in tumor diagnosis.
目的:建立端粒重复序列扩增(TRAP)-银染色技术,探讨端粒酶活性检测在肿瘤诊断中的意义。
The fault detection mechanism of existing topology-aware ALM protocol is very simple which greatly weakens its performance.
现有拓扑感知应用层组播中的故障检测机制极其简单,大大削弱了拓扑感知应用层组播的系统性能。
Here we present the results of the study on the detection of Influenza virus in the ambient air contaminated with high concentrations of bacteria and fungi using real-time PCR protocol.
本篇中成功于一高浓度细菌及真菌之大气环境中建立侦测流感病毒之技术。
Here we present the results of the study on the detection of Influenza virus in the ambient air contaminated with high concentrations of bacteria and fungi using real-time PCR protocol.
本篇中成功于一高浓度细菌及真菌之大气环境中建立侦测流感病毒之技术。
应用推荐