...据库 -维普资讯 关键词: 网络安全 攻击场景 权能转换模型 入侵检测[gap=832]Key words: Internet security; attack scenario; capability transition model; intrusion detection...
基于48个网页-相关网页
...发生.在文献 相同或相近的报警合并成一个报警.[4]所进行的实验中使用了snort和EMERALD两 定义2.攻击过程(attack scenario).是多个不种IDs,实验结果表明两种IDs之间可以相互补充, 同攻击动作按一定顺序所形成的入侵过程.对两者报警进行关联就可以得出...
基于12个网页-相关网页
The Division of attack stage and the establishment of attack scenario based on risk weights is still meaningful to maintain network security.
本文中对攻击阶段的划分和基于风险(Risk)权值的攻击场景的建立对于有效维护网络安全仍然是有意义的。
参考来源 - 一种基于攻击树的网络攻击模型·2,447,543篇论文数据,部分数据来源于NoteExpress
The total transfer time went way up: from just 1 minute at the baseline to almost 13 minutes under the full attack scenario.
总的传输时间达到:从基准的 1 分钟达到完全攻击场景中的 13 分钟。
The specific attack scenario for a Linux SACK processor requires a retransmission queue that already holds large Numbers of packets.
特定于Linux SACK处理器的攻击场景要求重传队列中已经持有大量包。
This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.
文章介绍了攻击树模型,提出了一种基于攻击树的网络攻击系统,它可以根据目标的实际情况制定出攻击策略,实施攻击。
应用推荐