本周早些时候,我们检测到攻击的迹象,在那里获得了获得了歌剧院同步系统。
Earlier this week, we detected signs of an attack where access was gained to the Opera sync system.
例如,如果这个消息类别是有关安全性方面的,那么如果检测到字典攻击,就应该产生一条警告消息。
For example, if the message category is related to security, a warning message should be produced if a dictionary attack is detected.
尽管目前很容易就可以检测到这些攻击,但是未来的变种可能会更具欺骗性。
Although these initial attacks were relatively simple to detect, future variations could easily become more deceiving.
在这个简单案例中,仪器甚至检测到了100个两种细菌间相互攻击的信号分子,其中能与已知分子相匹配只有10种。
Even in this simple case, the instrument detected as many as 100 different signalling molecules fired off by the two bacteria, only 10 of which the team managed to match to known molecules.
检测到的汗液程度也确定了一个事实,即当志愿者们认为他们所在的地方(摄影机的地点)被攻击时,他们确实感到自己受到了威胁。
The sweat levels confirmed that volunteers really did feel threatened when the place they perceived themselves to be-the site of the camera-was attacked.
DeticaTreidan检测到复杂赛博攻击的底层行为,这些行为通常很难被传统方法探测或过滤。
Detica Treidan detects the underlying activities associated with sophisticated cyber attacks, which typically go undetected and unfiltered by traditional methods.
详细的攻击日志——HDIV记录它检测到的每次攻击的信息,信息包括:url、用户名、IP地址和攻击类型。
Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.
例如,1983年,苏联的早期预警系统检测到美国即将进行核攻击。
In 1983, for instance, a Soviet early-warning system detected an incoming American nuclear attack.
试验结果表明,水印嵌入前后,视频质量没有显明的变化,在无攻击时检测到的水印信息和原水印信息比拟也没有显明的变化。
Test results show that embedding around video quality has not changed significantly, in the absence of attack detection of the watermark and the original watermark than no obvious changes.
此更新可以检测到目前的攻击,我们将继续以更新更应该创造。
This update can detect the current attacks and we will continue to update should more be created.
目前这些攻击都将是检测到的攻击文件复制到受害者的电脑,例如,作为其自我复制。
These current attacks will be detected when the attack file is copied to the victim's computer, for example, as part of its self replication.
现存的入侵检测系统缺乏从先前所观测到的进攻进行概括并检测已知攻击的细微变化的能力。
Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks.
数据采集器能对分段报文进行重组测试,可以很容易的检测到利用报文重组方式来发动的攻击,从而提高了检测的速度。
The data collector can test and recombine the segment datagram, easily find the attack that utilized the recombined datagram, thus improve the speed of detection.
另一方面,蜜罐作为一种新兴的主动防御技术,具有收集数据量小、价值高,能检测到未知攻击等优点。
On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.
本文提出了一个简单实用的动态检测模型用于检测SY N洪水攻击,可以实时有效和准确地检测到最为流行的SYN洪水攻击。
In this paper, we present a simply and applied dyn amic model for detecting SYN flooding attack, which is the most popular DOS attack.
而入侵检测领域则涵盖了从框架、抗攻击、高速网络检测到智能化检测等各个方面。
The research on intrusion detection system is involved with many respects, such as framework, defense of attack of IDS, detection on high speed network, intelligent detection.
虫洞攻击容易发动,很难被检测到,一般的加密认证方式不能防御虫洞攻击,需要在路由协议中有针对性添加特定的安全机制。
Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.
虫洞攻击容易发动,很难被检测到,一般的加密认证方式不能防御虫洞攻击,需要在路由协议中有针对性添加特定的安全机制。
Encryption and authentication mechanism has no use to defend against wormhole attack. It is need to embed corresponding mechanism in routing protocol to guarantee security.
应用推荐