基于攻击特征的检测具有准确性高的优点;
The way of attack signature detection has advantage of high accuracy.
保护,防止他们实现其目标,从已知的攻击特征的网络。
Protects the network from known attack signatures by preventing them from reaching their targets.
本文讨论了网络安全研究的紧迫性,黑客攻击特征,安全漏洞问题。
This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.
Evans称,由于它是自适应的,不需要攻击特征数据库,所以该技术很有吸引力。
The technique is attractive because it is adaptive and requires no attack signature database, Evans says.
本文的工作实现了一个开放式的网络攻击特征库系统,它包括了1200多条有效的攻击特征。
An open signature database for IDS has been implemented in the effort of this paper, which includes more than 1200 effective signatures.
在处理过程中采用了对攻击特征进行匹配的检测方式,其实现原理同大多数杀毒软件类似,对效率的要求极高。
The detection ways of matching attack signature was adopted in Process, its principle is same as most anti-virus software which require high efficiency.
攻击性决不是男性独有的特征。
他们的打算是通过训练病人免疫系统来识别活跃的巨细胞病毒感染的特征来达到促使免疫系统攻击肿瘤的目的。
Their intention was to encourage those patient's immune systems to attack the tumours by training them to recognise the signs of active cytomegalovirus infection.
但是,值得牢记的是,许多IPS嗅探器使用基于特征码的检测方法,这意味着当攻击被发现的时候才能被加入到数据库中。
Worth noting, however, is that many IPS sensors use signature-based detection, meaning that attacks are added to a database as they are discovered.
去年特征检测技术的问题日渐突出,网络攻击者越来越多的使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作。
The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.
他的所有这些风格特征都受到攻击者模仿嘲弄。
All these peculiarities of his style have been parodied by his assailants.
使xml格式抵制模糊攻击的关键特征是一个对输入不做任何假设的解析器。
The key characteristic that makes XML formats resistant to fuzz is that an XML parser assumes nothing about the input.
他们的特征都是小气的喜剧演员共有的——爱抱怨、冷漠、些许消极的攻击性。还有一种演员则不停地让你我笑到缺氧。
There's the cliche of the curmudgeonly comic – grouchy, aloof, a bit passive aggressive – and there's the one who can't switch off, and craves laughter like you or I need oxygen.
应激激素的大幅增加让女孩子们在托儿所表现出焦躁不安、警惕的状态,而男孩子们则表现出易怒和攻击性强等特征。
Girls with larger increases in the hormone acted more anxious and vigilant at child care, while boys acted more angry and aggressive.
所有这些反进化的特征使米洛很容易受到天敌的攻击。
All these anti-evolutionary traits make the Miro quite susceptible to attacks from predators.
攻击直升飞机指定为直- 9w (Z - 9w),特征是一对外部挂架和一套顶部安装瞄准具用于昼间目标搜索和跟踪。
The attack helicopter, designated Zhi-9W (Z-9W), features a pair of external weapon pylon and a roof-mounted optical sight for target searching and tracking in daylight.
通常,攻击是按其特征分类的。
Typically, attacks are categorized by their characteristics. Two of these characteristics are described below
然后有许多武器,并且攻击的特征是更加尖利。
Then there were so many kinds of weapons, and the characteristic of attack was more extrusive.
社会攻击几乎完全是雄犬的特征。
Social aggression is almost exclusively a male characteristic.
这种分类法评论了当前的DDOS防御机制并专注于在还没有解决的DDOS攻击难题中发现新特征。
This taxonomy reviews current DDOS defense mechanisms and focuses on finding new features in the DDOS attack problems that have not been solved.
第四章介绍了海量数据的存储与访问和DOS攻击的特征。
The fourth chapter describes the massive data storage and access features and DOS attacks.
着重分析了变换域数字水印系统的特征及常见攻击,给出了一些相应的对策。
Characters and common attacks of transform domain digital watermark system were analyzed on emphasis. And we give some corresponding countermeasures.
这些骨头损伤的形状与位置具有结核杆菌感染的特征,表明杆菌攻击了颅骨隔板。
The shape and the location of the lesions are characteristic of a form of TB that attacks the lining of the brain.
而SQL注入攻击具有广泛存在、手段隐蔽、特征不可枚举、攻击手段及工具平民化的特征。
The characteristics of SQL injection attacks is widespread, covert means, characteristics, methods and tools nonenumerative attack civilians.
研究人员利用动作捕捉技术发现,人的动作可以揭露一定的性格特征,如攻击性,亲和力和外向。
Using motion capture technology, researchers found that movements reveal certain personality traits, such as aggression, agreeableness and extroversion.
简单来说,地图意识就是要知道地图的布局,了解它的咽喉要道,攻击角度,以及它不同于其他地图的复杂特征,在对战的时候,要时刻谨记。
Put simply, map awareness is knowing the map layout; its choke points, attack angles, and specific intricacies, and keeping these in mind as you play.
最后讨论如何根据溢出规律和植入代码的结构特征,采取有效措施来防御缓冲区溢出攻击。
At last discuss how to defense buffer overflow by the rule of buffer overflow and the structure character of injected code.
基于伪装网络服务监测跟踪攻击行为及过程,可以有效地研究发现未知攻击方式及其特征。
Camouflaging network service can monitor and track attacks and its processes; also it can find unknown attack and its characters.
基于伪装网络服务监测跟踪攻击行为及过程,可以有效地研究发现未知攻击方式及其特征。
Camouflaging network service can monitor and track attacks and its processes; also it can find unknown attack and its characters.
应用推荐