模型还采用了协议分析技术。
In addition, this model USES the protocol analysis technology.
对协议分析技术在IDS中的应用进行讨论。
The application of the protocol analysis technology in IDS is also discussed in this paper.
网络协议分析是网络入侵检测中的一项关键技术。
The network protocol analysis is an essential technique in network intrusion detection.
密码协议分析与设计的基础是对其进行形式化建模。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
因此密码协议设计和密码协议分析是信息安全领域的难题。
So the design and analysis of cryptographic protocols are the troubles of information security.
网络协议的形式化模型是协议分析和设计的核心技术之一。
The formal models of network protocols are one of the core technologies in the analysis and design of the protocols.
在协议分析模块中,分析和比较了三种常见的会话重建技术。
In this module, the paper analyses and compares three common session rebuilding technologies.
这些工具能够帮您捕捉和解码数据包,通常也能为您执行大多数的协议分析。
These provide a combination of both capturing and decoding content for you, often performing the bulk of the protocol analysis process for you.
Ethereal是一个专业的协议分析软件,它可以帮助调试应用层协议。
Ethereal is a professional protocol analyzer that can help debug application layer protocols.
本文提出了一种基于半马尔可夫模型的VHF信道访问协议分析方法。
A new method of VHF channel access protocol analysis based on semi-Markov model is presented in this paper.
针对模式匹配算法带来的高漏报率和误报率,引入了协议分析的方法。
This paper introduced one method called protocol analysis due to the high false acceptance rate and high alarm rate caused by pattern match algorithm.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
协议分析和协议综合是实现协议验证的两种有效途径,前者更为有效和实用。
The analysis and synthesis of protocols are two efficient approaches to verify protocols; the former is more efficient than the latter.
协议分析是目前多数入侵检测系统所采用的技术,用以弥补单纯的模式匹配的不足。
Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.
在源信息采集方面,建立了网络信息捕获构架,基于协议分析实现网络数据的提取;
Network data capturing frame and network protocol analyzer are designed to collect source information.
在整个设计中作者分析和实现了网络数据包捕获技术、协议分析技术和数据库存储。
The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
吉姆团队采取了三种不同的分析方法——意图治疗分析,改良的意图治疗分析,以及居前协议分析。
Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
分析引擎使用了协议分析和模式匹配相结合的检测方法以及改进了的匹配算法,提高了检测速度。
It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.
组合事件生成引擎中应用层的协议分析和脚本的分析能力可以提供非常准确强大的入侵检测功能。
Make up incident turn into engine employ agreement analysis and analytical capacity of script of layer can offer accurate strong invasion measure the function.
设计了一个入侵检测系统的基本框架,并深入探讨了其中的包捕获机制、包过滤机制和协议分析机制。
It deeply probes into the packet capture module, packet filter module and protocol analysis module of a IDS.
在协议分析的基础上,采用IP数据包分片重组、TCP数据流还原等技术,降低漏报率,减少误报率。
On the base of protocol analysis, the system USES the technology of the fragment reassembly of IP packet, TCP data flow reverting, etc. It reduces leak and mistake alert of the intrusion.
本文在对DHCP协议分析的基础上,对DHCP二级代理机制进行了探讨,并给出了具体的实现过程。
Discusses the DHCP two-level proxy mechanism based on the analysis of DHCP, and introduces the realization process in detail.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
协议分析者可以用该逻辑来对安全协议进行分析,而协议设计者可以使用该逻辑用一种系统的方法来构造安全协议。
Protocol analyser can analyse security protocol by the logic, and protocol designer can construct security protocol by the logic in a systematic way.
协议分析者可以用该逻辑来对安全协议进行分析,而协议设计者可以使用该逻辑用一种系统的方法来构造安全协议。
Protocol analyser can analyse security protocol by the logic, and protocol designer can construct security protocol by the logic in a systematic way.
应用推荐