Many methods are used in analysis model to detect intrusion actions, such as protocol analysis, expert system, application layer data reconstruction, intrusion detection.
对于获得的数据,分析模块采用多种方式综合分析入侵行为,包括协议分析、专家系统、应用数据还原、入侵检测等技术。
You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols.
您可以检查,保存,过滤器,进口和出口捕获的数据包,查看协议解码与广泛的协议,超过70分析的最低层。
Quantitative analysis and simulation result also show that it's feasible and effective to implement service discovery protocol based on existed route protocols using cross-layer design methodology.
理论分析和仿真实验结果均表明,采用跨层设计思想在现有路由协议的基础上实现的服务发现协议是高效和可行的。
Quantitative analysis and simulation result also show that it's feasible and effective to implement service discovery protocol based on existed route protocols using cross-layer design methodology.
理论分析和仿真实验结果均表明,采用跨层设计思想在现有路由协议的基础上实现的服务发现协议是高效和可行的。
应用推荐