下面列出了四种主要类别中的特定攻击类型。
Specific types of attacks within the four broad categories are listed below.
不难想象,本文可选择的攻击类型范围很广。
The variety of attacks to choose from for this article was great, as you can imagine.
在发现可实现的攻击类型后,应考虑如何保护您的组织。
After discovering the types of attacks available, consider how you can defend your organization.
我们讨论了一些常见的攻击类型和这些攻击所带来的后果。
We discussed some common types of attacks and the results that attackers can obtain.
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
现在还不能确定是什么样的攻击类型或者是谁在背后操作。
It's very early in the investigation to determine what type of attack or who might have been behind it.
描述常见的网站安全攻击类型以及如何帮助阻止这些攻击。
Describes common types of Web-site security attacks and how to help prevent them.
贝叶斯分类模型是入侵检测中用于攻击类型分类的有力工具。
Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.
也就是说,它们只能很好的验证那些工具发行者已知的攻击类型和数量。
That is, the validation they perform is only as good as the number of attack vectors known to the publishers of the tool.
每个级别防范不同的攻击类型,并提供对攻击者更有效的屏障。
Each level tries to thwart different types of attacks and also provides more barriers to attackers.
说明常见的网站安全性攻击类型和利于避免受到攻击的方法。
Describes common types of Web site security attacks and how to help prevent them.
在这四种主要分类中又有一些不同的攻击类型,稍后我们将对它们进行介绍。
There are several types of attacks within these four broad classifications, which we will look at in a minute.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
攻击类型的技能消耗的能量较少,而防御类型的技能会消耗大量的能量。
The energy bar has been designed to be favorable to use offensive skills and less favorable to use defensive skills. Tactically moving out of combat can drain energy quickly.
还需要使用前面介绍的针对不同攻击类型的其他监视类型以及配置来确保与服务级协议的兼容性。
Other types of monitoring for the types of attacks mentioned above are also needed, as well as configurations to ensure compliance with service-level agreements.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
要点是,有很多不同类型的入侵者、很多不同的入侵动机以及(我们后面将会看的)许多不同的攻击类型。
The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
如您所见,有很多不同类型的入侵者、很多不同的动机,以及(我们后面将要讨论的)许多不同的攻击类型。
As you can see, there are many different types of intruders and motivations and, as we will discuss later, many different types of attacks.
其中有些攻击类型是比较常见的,这些相同的攻击类型会出现在任何可以远程访问的服务中(例如,消息篡改)。
Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).
传统的入侵检测方法在面对多变的网络结构时缺乏可扩展性,而且在未知的攻击类型面前也缺乏适应性。
Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.
本文首先对冗余事件的关联特征进行系统的分析,包括攻击类型关联特征、空间关联特征、时间关联特征。
This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.
这些攻击类型是最危险的,因为它们要求的技能很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous because they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
详细的攻击日志——HDIV记录它检测到的每次攻击的信息,信息包括:url、用户名、IP地址和攻击类型。
Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.
这些攻击类型是最危险的,因为它们需要的技能往往很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous, as they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
应用推荐