目的为网络攻击技术研究策略提供文献依据。
Aim Provide a literature basis for research strategy of the network attack technology.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attack technology is a very efficient attack technology based on network.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
Network covert channel has been widely used for network attack.
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
演习模拟了一次协同网络攻击,目标是信息技术、通信、化学和交通系统与设施。
The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
本周谷歌披露说,一次来源于中国的网络攻击,通过使用一项“鱼叉式网络钓鱼”技术提取那些粗心大意的谷歌邮箱用户的账号密码。
This week Google revealed that a cyber attack originating from China had used a technique known as "spear phishing" to extract Gmail passwords from unwary users.
去年特征检测技术的问题日渐突出,网络攻击者越来越多的使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作。
The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.
此外,标准的技术,如基于网络的漏洞扫描通常被IaaS提供商所禁止,原因之一是无法把友好的扫描从攻击者的活动区别开来。
Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.
随着DDoS攻击开始被有组织犯罪以发起网络攻击为威胁成为敲诈勒索小公司钱财的手段,这个技术肮脏的一面开始闪现。
The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.
如何辨别防御与攻击和增强网络安全已成为网络运营商和技术管理人员、甚至普通网络用户研究的问题。
Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.
这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。
In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
因为单一的校验和技术比较容易被攻击代码屏蔽,所以有人提出更安全的方案:互联校验和网络,只有令整个网络失效,才能对付这种抗篡改技术。
Since a single checksum is relatively easy for an attacker to disable, stronger proposals rely on a network of inter-connected checksums, all of which must be disabled to defeat tamper resistance.
基于机器学习的入侵检测方法是大规模、高带宽网络环境下实现对网络攻击智能检测的关键技术之一。
Intrusion detection techniques based on machine learning is one of the key technologies to be applied to intelligent intrusion detection under the circumstance of large scale and bandwidth network.
目前,传统的被动防御技术将无法应对不断增加的大规模网络攻击行为。
Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.
网络告警因果关联技术有助于管理员根据告警之间的因果关系构建攻击场景,及时调整防范措施。
Network alarm causal correlation technology can help network administrators construct attack scenarios and take timely responses by unveiling the causal relationship of intrusion alarms.
随着互联网的飞速发展,网络攻击和安全防护技术日益受到关注。
With the rapid development of Internet, the technology of network attack and safety protection have been paid attention more and more.
战地网络极易受到各种攻击和破坏,要实现其安全通信,密钥管理是关键技术。
Key management is an essential technique to secure communication which is critical in the tactical environments where the network infrastructure is vulnerable to various attacks and compromises.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
威胁评估模块将预警分析的结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度。
The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.
针对网络数据库系统不断遭受攻击,而现有的各种安全技术,对数据库系统的安全保护还非常有限。
The network database system is continuously intruded by all kinds of attacker, however the existing security technologies couldn't give protection very well to database system.
概要介绍了国内外关于网络攻击分类技术的研究现状,并对其发展趋势进行了分析。
This paper introduces the status quo of network attack classification summarily, and the trend is analysed.
网络预警技术因其可预知主体受攻击的可能性和具体的指证将要发生的行为和产生的后果,而受到网络安全业界的重视。
The early warning technology attaches great importance in the network security field because it can foresee the possibility of the attacks and the following behavior and consequences.
由网络攻击而带来的经济损失也越来越严重,这促使人们不得不越加重视对网络安全防御体系及相应技术的研究。
The economic losses brought with network attack is also serious, this makes people have to aggravate the more regard the research for network safe defence system and corresponding technology.
随着计算机网络技术的广泛应用,网络安全问题已不容忽视,作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
With the extensive application of computer network technology, security problem could not be ignored. Computer network, as an open system, has to face up to various threats and attacks.
对网络产品进行攻击测技术就是一种主动地行之有效的网络安全防护技术。
Attacking technology of examining to the networking products is a kind of effectual network safe protection technology on one's own initiative.
本文在阐述拒绝服务攻击基本概念的基础上,分析并探讨了网络负载均衡技术在网络抗拒绝服务中的应用。
The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.
本文在阐述拒绝服务攻击基本概念的基础上,分析并探讨了网络负载均衡技术在网络抗拒绝服务中的应用。
The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.
应用推荐