本课程将包括基本和高级的SSL终端设备设计的网络图表和数据包流,如SSL终端、后端SSL和SSL启动。
The session includes network diagrams and packet flows for both basic and advanced designs with SSL termination devices, like SSL termination, back-end SSL, and SSL initiation.
sprayd守护进程和相关联的spray工具向指定的主机发送一个大的数据包流,判断这些数据包中有多少得到了响应。
The sprayd daemon and the associated spray tool send a large stream of packets to a specified host and determine how many of those packets get a response.
为一acl数据包,可中断正常的SCO数据流。
An ACL packet, which can interrupt the regular flow of SCO data.
TCP基于数据包确认从对等端点控制数据流。
TCP controls the flow of data based on packet acknowledgements from the peer endpoint.
UDP数据包无连接,可广播到所有主机,而非单一单播流。
UDP packets are connectionless and can be broadcast to all hosts instead of a single unicast stream.
一个叫做tcpflow的新工具与tcpdump相辅相成,它提供协议流分析和适当地重构数据流的方法,而不管数据包的顺序或重发。
A newer tool called tcpflow complements tcpdump and provides a way to do protocol flow analysis and to properly reconstruct data streams, regardless of packet order or retransmissions.
因为网络通信流常常通过不可信的网络传输(考虑一下您喜欢的wifi热区),数据包很容易被捕获,所以应该使用SSL加密重要的We b通信流。
Since network traffic is often traveling over untrusted networks (consider your favorite WiFi hotspot), where capturing packets is quite easy, important Web traffic should be encrypted using SSL.
如果只显示您主机发送的数据包,这也表明从目标主机发送回的通信流有问题,因此反向路由有问题。
If only packets sent by your host are shown, this is another indication that the problem is with traffic sent back by the target and therefore the route back.
基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
在每个交换机上安装一个丢弃所有数据包的流。
目前,研究适合于信道出错、通道容量可变的无线网络理想流调度系统及其数据包调度算法是无线领域研究的一个热点问题。
At present, the work related to ideal flow scheduling system and packet scheduling algorithm for error-prone wireless channel is a hot topic in the research field of wireless communication.
深度数据包处理在一个数据流当中有多个数据包,在寻找攻击异常行为的同时,保持整个数据流的状态。
Deep packet processing has multiple packets in a data stream, while searching for the behavior of the entire data stream.
网络中的数据流是不确定的,数据包的到达时间、长度和处理时间都是随机变量。
Data stream of network is random. Arrival time, length and processing time of data packet are random variable.
在协议分析的基础上,采用IP数据包分片重组、TCP数据流还原等技术,降低漏报率,减少误报率。
On the base of protocol analysis, the system USES the technology of the fragment reassembly of IP packet, TCP data flow reverting, etc. It reduces leak and mistake alert of the intrusion.
跨度端口可以被配置在这样一种方式,目的港的跨度为入口的数据包将通过监测能见度只有80RTP流和那里。
The span port can be configured in such a way that the span destination port will have visibility into ingress packets only and there by monitoring 80 RTP streams.
另外,采用基于流级的基础上对数据包进行分类,基本上不会产生数据包的乱序问题。
Moreover, we categorize data packets at the flow level, and it decreases packet disorder.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
TLI通过对传输层数据包进行分析并结合P 2 P系统所表现出来的流量特征,来识别某个网络流是否属于P 2 P。
By analyzing packets of the transport layer and the traffic characteristic in the P2P system, TLI can identify whether or not the network data flow belongs to the P2P system.
窗口是数据包调步、 数据流控制的主要机构。
The window is the main mechanism of pacing, or flow control, of packets.
传统的P 2 P流量识别方法主要有基于端口的识别方法、深层数据包检测技术、基于流特征的识别技术等。
Traditional P2P traffic identification methods are based on port identification, or deep packet inspection technology, or based on identifying technology of flow characteristics.
无须等待数据对于性能的增益很大——每个TCP流数据包会小很多。
Not waiting for a database is a big win in terms of performance – the amount of bagage associated with each TCP stream is just much smaller.
无须等待数据对于性能的增益很大——每个TCP流数据包会小很多。
Not waiting for a database is a big win in terms of performance – the amount of bagage associated with each TCP stream is just much smaller.
应用推荐