在第三部分重点对网络攻击效果评估方法进行介绍。
In the third part of this paper, the effect evaluation technology is presented in emphasis.
该文从评估网络攻击效果的角度研究网络安全问题。
This paper investigates network security problems from the point of view of the evaluation of network attack effect.
提出了一种基于网络信息熵的计算机网络攻击效果定量评估模型。
An attack effect evaluation model of computer network based on network entropy was proposed in this paper.
网络攻击效果评估中指标之间权重分配是进行评估的一个关键问题。
The distribution of the weight among the ingredients is a key problem in network attack effect evaluation.
网络攻击效果评估理论和方法研究在信息系统的安全评估过程中具有深刻的理论指导意义和重要的应用价值。
The evaluation theory and method of the attack effect of networks are very important and significant in information systems.
“在特定的时候很难办到,”他说,“如果网络攻击作为军事武器使用,你会希望得到一个可预测的时间和效果。
“It’s hard to do it at a specific time, ” he says. “If a cyber-attack is used as a military weapon, you want a predictable time and effect.
“很难在某个特定的时间进行网络攻击,”他说,“如果网络攻击被当作军事武器,你需要预先设定时间和攻击效果。”
"It's hard to do it at a specific time," he says. "if a cyber-attack is used as a military weapon, you want a predictable time and effect."
实验结果表明,该系统模型不仅可以保护网络和主机不受已有攻击的威胁,还可以检测出未知的攻击,达到了预期效果。
Expermental results show that the system model can not only protect the network and host from existing attacks, can detect unknown attacks, achieved the expected results.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
应用推荐