• 目的网络攻击技术研究策略提供文献依据。

    Aim Provide a literature basis for research strategy of the network attack technology.

    youdao

  • 缓冲区溢出攻击技术一项十分有效的网络攻击技术

    Buffer overflow attack technology is a very efficient attack technology based on network.

    youdao

  • 网络隐蔽通道技术一种被广泛应用网络攻击技术

    Network covert channel has been widely used for network attack.

    youdao

  • 主要方式网上教授病毒木马制作技术各种网络攻击技术

    Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    youdao

  • 为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    youdao

  • 然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍都认识不清

    Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    youdao

  • 演习模拟了一次协同网络攻击,目标是信息技术通信化学交通系统设施

    The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

    youdao

  • 本周谷歌披露说,来源于中国网络攻击通过使用一项“鱼叉网络钓鱼技术提取那些粗心大意的谷歌邮箱用户账号密码

    This week Google revealed that a cyber attack originating from China had used a technique known as "spear phishing" to extract Gmail passwords from unwary users.

    youdao

  • 去年特征检测技术问题日渐突出网络攻击越来越多使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作

    The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.

    youdao

  • 此外标准技术基于网络漏洞扫描通常IaaS提供商禁止原因之一是无法友好的扫描攻击者的活动区别开来。

    Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.

    youdao

  • 随着DDoS攻击开始有组织犯罪以发起网络攻击威胁成为敲诈勒索公司钱财手段,这个技术肮脏的一面开始闪现。

    The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.

    youdao

  • 如何辨别防御攻击增强网络安全已成为网络运营商技术管理人员甚至普通网络用户研究问题

    Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.

    youdao

  • 这里我们对僵尸网络普遍攻击技术以及涉及到的个人一个更贴近观察

    In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    youdao

  • 因为单一校验技术比较容易攻击代码屏蔽,所以有人提出安全的方案:互联校验网络,只有令整个网络失效,才能对付这种篡改技术

    Since a single checksum is relatively easy for an attacker to disable, stronger proposals rely on a network of inter-connected checksums, all of which must be disabled to defeat tamper resistance.

    youdao

  • 基于机器学习入侵检测方法大规模高带宽网络环境实现网络攻击智能检测关键技术之一

    Intrusion detection techniques based on machine learning is one of the key technologies to be applied to intelligent intrusion detection under the circumstance of large scale and bandwidth network.

    youdao

  • 目前传统被动防御技术无法应对不断增加大规模网络攻击行为

    Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.

    youdao

  • 网络告警因果关联技术有助于管理员根据告警之间因果关系构建攻击场景及时调整防范措施。

    Network alarm causal correlation technology can help network administrators construct attack scenarios and take timely responses by unveiling the causal relationship of intrusion alarms.

    youdao

  • 随着互联网飞速发展网络攻击安全防护技术日益受到关注。

    With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.

    youdao

  • 战地网络极易受到各种攻击破坏,实现其安全通信密钥管理关键技术

    Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.

    youdao

  • 对于当前混合型攻击层出不穷安全威胁传统基于单一设备网络安全防护技术己显得无能为力了

    For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.

    youdao

  • 威胁评估模块将预警分析结果攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度

    The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.

    youdao

  • 针对网络数据库系统不断遭受攻击现有各种安全技术数据库系统的安全保护非常有限。

    The network database system is continuously intruded by all kinds of attacker, however the existing security technologies couldn't give protection very well to database system.

    youdao

  • 概要介绍了国内外关于网络攻击分类技术的研究现状对其发展趋势进行了分析。

    This paper introduces the status quo of network attack classification summarily, and the trend is analysed.

    youdao

  • 网络预警技术预知主体受攻击可能性具体指证将要发生的行为和产生的后果,而受到网络安全业界的重视

    The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.

    youdao

  • 网络攻击带来经济损失越来越严重促使人们不得不越加重视网络安全防御体系相应技术研究

    The economic losses brought with network attack is also serious, this makes people have to aggravate the more regard the research for network safe defence system and corresponding technology.

    youdao

  • 随着计算机网络技术广泛应用网络安全问题不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁攻击

    With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.

    youdao

  • 网络产品进行攻击技术就是主动地行之有效网络安全防护技术

    Attacking technology of examining to the networking products is a kind of effectual network safe protection technology on one's own initiative.

    youdao

  • 本文阐述拒绝服务攻击基本概念基础分析探讨了网络负载均衡技术网络拒绝服务中的应用

    The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.

    youdao

  • 本文阐述拒绝服务攻击基本概念基础分析探讨了网络负载均衡技术网络拒绝服务中的应用

    The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定