本系统的开发就是为了给网络使用者提供一个有用的网络数据包分析工具。
The development of the system was to provide the users with a useful tool that analysis the network packets.
要排除这个故障,我建议你安装一些数据包分析器来孤立和发现这个问题。
To troubleshoot this issue, I would suggest loading up some packet analyzersto try to isolate and find the problem.
然后在介绍了分层网络数据包的类型及结构的基础上,给出数据包分析处理类的设计。
Then, It introduces the types and structures of packets and presents the design of packet analysis class.
除了用作数据包分析工具之外,还可以用来“fuzz”站点,寻找前面提到的那些exploit。
In addition to serving as a tool for packet analysis, you can use it to "fuzz" sites, looking for some of the same exploits mentioned above.
安全产品经常提供很多的重要的分析价值,它们经常提供比跟踪/状态数据包更好的信息来理解站点上发生的事情。
The products often provide great analytics value because they are sometimes better than normal tracking/stats packages for understanding what's going on with your site.
这一分析机制确定了受怀疑的泄漏数据结构类和数据包。
The analysis mechanism identifies suspected leaking data structure classes and packages.
通过分析数据包,我能够识别之前并没有注意的错误代码,并且能够指出这个错误及导致发生问题的查询。
By drilling down into the packets, I could identify a problem with the code I hadn't previously noticed and identify both the error and the query that triggered the problem.
这些工具能够帮您捕捉和解码数据包,通常也能为您执行大多数的协议分析。
These provide a combination of both capturing and decoding content for you, often performing the bulk of the protocol analysis process for you.
一个叫做tcpflow的新工具与tcpdump相辅相成,它提供协议流分析和适当地重构数据流的方法,而不管数据包的顺序或重发。
A newer tool called tcpflow complements tcpdump and provides a way to do protocol flow analysis and to properly reconstruct data streams, regardless of packet order or retransmissions.
虽然运行诸如netstat之类的命令可以提供一些有用的信息,但有时您仍然需要深入到数据包级别上进行更进一步的分析。
While running commands such as netstat can provide useful information, sometimes you need to drill down more to the packet level.
虽然运行netstat等命令可以提供有用的信息,但有时您仍然需要深入到数据包作进一步分析。
While running commands (such as netstat) can provide useful information, sometimes you need to drill down more to the packet level.
列出导致堆使用增长的可疑数据结构、数据类型和数据包,用于比较分析;列出大规模堆,用于单一传储分析。
Lists suspected data structures, data types, and packages contributing to the growth in heap usage for comparative analysis, and to the large size of the heap for single dump analysis.
深度数据包处理要求以极高的速度分析、检测及重新组装应用流量,以避免应用时带来时延。
Deep packet processing requires extremely high speed analysis, detection, and re assembly of application traffic to avoid delays in applications.
协议分析仪:选择集成的协议查看器,可快速、深入地了解协议层和物理层之间的数据包和时间关系。
Integrated protocol analyzer: protocol viewer, can quickly and thoroughly understand the relationship between the protocol layer and the physical layer data packets and time.
然后,利用数据包捕获机制对攻击数据进行收集、分析和记录。
Then, using packet capture mechanism to attack the data collection, analysis and recording.
性能分析和实验结果表明,改进的检测系统具有扩展性,能合理的分发数据包,充分的利用入侵检测模块的资源。
Performance analysis and experiments demonstrate that the model is scalable, and can dispatch packets reasonably and utilize intrusion detection system 'sources effectively.
在协议分析的基础上,采用IP数据包分片重组、TCP数据流还原等技术,降低漏报率,减少误报率。
On the base of protocol analysis, the system USES the technology of the fragment reassembly of IP packet, TCP data flow reverting, etc. It reduces leak and mistake alert of the intrusion.
通过仿真,文中给出了VTBR算法与传统位置辅助路由协议的性能对比分析,对数据包传输成功率和平均路径长度这两个性能参数进行了评价。
The performance comparison between VTBR and traditional position based routing protocols shows that VTBR algorithm has a much higher packet delivery success rate and a shorter average path length.
本文通过实验对这四种数据包捕获方法进行评估,并且分析了NAPI模式和中断模式对数据包捕获方法的影响。
In this thesis, all of four methods are evaluated experimentally, and influences of NAPI and interrupt model on packet capture are analyzed.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
基于数据链路层的网络计费方式中关键的技术在于链路层数据包的捕获及分析。
The key technology of net-charging based on data-link Layer is the capture and analysis of data frame.
分析和实验结果表明,此系统可以较为及时地捕获数据包,并能对过滤出的数据包做出正确的分析。
The final analysis and experimental results show that this system can be timely capture data packets and filter out them, then make the right analysis.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
您可以检查,保存,过滤器,进口和出口捕获的数据包,查看协议解码与广泛的协议,超过70分析的最低层。
You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols.
分析和排除网络上数据包传送的问题。
Analyzes and troubleshoots packets of data transferred over the network.
通过对网络数据包的分析,挖掘出网络系统中频繁发生的行为模式,并运用模式相似度比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。
By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.
此外,本文还分析了数据包过滤技术的另一个问题:规则冲突,给出了一个规则冲突的理论分析和查找算法。
In addition, the paper has analyzed another problem in the data packet filter technical: rule conflict, and has produced the rule conflict theory research and the searching algorithm.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
从串口接收数据,分析收到的数据包,然后根据算法进行运算,最后将结果从串口返回。
Receive data from serial analysis of received packets, and then computing algorithm, and finally return the results from the serial port.
这也是一个基于网络抓包捕获的源代码,支持应用层数据包的抓取分析。
This is a web-based Ethereal to capture the source code, support the application layer packet capture analysis.
应用推荐