部署入侵监测和防入侵系统。
Deploy intrusion-detection and intrusion-prevention systems.
他们的目标是想尽办法入侵系统,所以他们会在您的设计中寻找漏洞。
Their goal is to break your systems any way they can, and look for holes in your design as they do so.
系统调用劫持是黑客入侵系统后保留后门常用的一项技术。
System call hijacking is a common technology used by hackers to keep backdoors on the compromised sys-tem.
而IDS则成为了一个备份系统,因为很少人能入侵系统而激活报警机制。
The IDS will become a backup system, rarely forced to sound an alarm that someone has actually gotten past your secure threshold.
本文提出的算法以及入侵系统模型使用入侵检测数据集kddcup99作为测试集验证性能。
The algorithm proposed in this paper realizes the corresponding module and validates the performance in the KDDCUP99 intrusion detection data set.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
审计线索不仅突出了网络上脆弱之处,而且还能识别出一次内部作业中用于入侵系统的口令和设备。
The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.
但是现在哈佛大学的研究人员表示,这种蛋白的确是有不为人知的功能,它是大脑抵御细菌和其他微生物入侵系统的一部分。
But now researchers at Harvard suggest that the protein has a real and unexpected function - it may be part of the brain's normal defenses against invading bacteria and other microbes.
您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
You know that Snort is an intrusion detection system, but how does it detect intrusion?
堡垒的保护更容易因为它构造更简单:它没有窗口、几乎没有几道门,没有天窗或通风系统这些入侵者可能利用的东西。
A fortress is easier to protect because it's simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.
这只是对我们的免疫系统试图防御的潜在外来入侵者的分类介绍。
Just an introduction to the classes of potential foreign invaders that our immune system tries to defend us against.
入侵一个地区的物种会危害生态系统、农业和人类健康。
Species that invade a territory can harm ecosystems, agriculture and human health.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
那么究竟什么是入侵检测系统?
它是一种入侵检测系统——而不仅仅是工具。
他们的目标是想尽办法入侵我们的系统。
当某些黑客入侵您的系统只是为了取乐时,这将是一个问题。
This can be a problem when some hackers break into systems simply for the fun of it.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
研究人员希望通过展示如何入侵某些系统的方式,督促计算机行业采取措施使基础设施和消费者更加的安全。
Researchers hope that by showing off how to hack certain systems, the computer industry will take steps to make infrastructure and consumers safer.
冈萨雷斯和他的俄国同伙建立了一套极为先进的系统,用于入侵、下载信用卡号码。
Gonzalez and his Russian helpers are said to have set up a sophisticated system for hacking into and downloading credit card Numbers.
作者很快得出了两个重要的主题:入侵检测系统,IDS,和旁路过滤。
The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.
使用这一法案进行的诉讼,较为典型的起诉对象是入侵他人电脑系统的黑客。
More typically, prosecutions under the act have involved people who hack into computer systems.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
这个步骤的目标是以一种特殊方式格式化有效负载,以便它能躲避壁垒森严的入侵探测系统(IDSs)。
The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。
Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
应用推荐