• 基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标攻击路径

    An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.

    youdao

  • 路径带宽受到网络物理属性限制攻击获得更多基础设施的情况下很难增加带宽。

    Bandwidth of a path is capped by the physical properties of the network-an attacker cannot easily increase bandwidth without acquiring more infrastructure.

    youdao

  • 网络攻击通常攻击最后目标使用双向交互式连接一系列中间主机(跳板机)掩盖真实攻击路径

    Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones) before they attack the final target.

    youdao

  • 网络攻击通常攻击最后目标使用双向交互式连接一系列中间主机(跳板机)掩盖真实攻击路径

    Usually network attackers conceal their real attacking paths by establishing interactive connections along a series of intermediate hosts (stepping stones) before they attack the final target.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定