本系统的开发就是为了给网络使用者提供一个有用的网络数据包分析工具。
The development of the system was to provide the users with a useful tool that analysis the network packets.
然后在介绍了分层网络数据包的类型及结构的基础上,给出数据包分析处理类的设计。
Then, It introduces the types and structures of packets and presents the design of packet analysis class.
分析和排除网络上数据包传送的问题。
Analyzes and troubleshoots packets of data transferred over the network.
基于数据链路层的网络计费方式中关键的技术在于链路层数据包的捕获及分析。
The key technology of net-charging based on data-link Layer is the capture and analysis of data frame.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
数据包截获机制是网络性能分析工具和网络安全工具的实现基础。
Capture mechanism on network data packages is the basic analysis tools of network capability and network security systems.
数据包采样方法是提升数据包处理能力很好的方法,在网络流量监测分析中得到了广泛应用。
Packet sampling which was widely used in network monitoring is a good method to upgrade data packet processing capacity.
在整个设计中作者分析和实现了网络数据包捕获技术、协议分析技术和数据库存储。
The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.
入侵检测模块将根据网络数据包捕获模块上接收到的包并结合网络入侵规则库进行分析,把分析的结果传递给系统管理模块。
Network intrusion detection module will analyze the package from data packet capture modules and combine network intrusion rule database, and then transmit the results to the system management module.
TLI通过对传输层数据包进行分析并结合P 2 P系统所表现出来的流量特征,来识别某个网络流是否属于P 2 P。
By analyzing packets of the transport layer and the traffic characteristic in the P2P system, TLI can identify whether or not the network data flow belongs to the P2P system.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
所以研究有关数据包捕获和分析技术对保证网络的健康、安全运行是很有意义的。
So it is significative to research the technology of capturing, monitoring and analyzing of network data.
通过对网络数据包的分析,挖掘出网络系统中频繁发生的行为模式,并运用模式相似度比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。
By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.
对网络处理器中多微引擎并行处理的两种编程模型进行分析,讨论了如何将数据包处理任务在多个微引擎之间进行分配,从而取得较高处理性能的一般性策略问题。
This paper shows two programming models of Multi-Microengine parallel processing in Network Processor and presents a better way of assigning packet-processing tasks among microengines.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
对于同时存在网络诱导时延和数据包丢失的网络控制系统进行了建模、稳定性分析和控制器的设计。
Modeling, stability analysis and controller design are done for the NCSs with both network-induced time delay and packet-dropout synchronously.
该文截取实际网络链路上的流量,对数据包处理过程进行模拟,并分析cache机制对网络处理器的各性能参数的影响。
This paper presents a simulation of the packet processing procedure using real traffic traces to analyze the impact of the caching mechanism on the network processor performance.
这也是一个基于网络抓包捕获的源代码,支持应用层数据包的抓取分析。
This is a web-based Ethereal to capture the source code, support the application layer packet capture analysis.
程序的主要功能包括网络数据包捕获和常用网络协议分析。
It has a rich feature set which includes capturing network packets and analyzing popular network protocols on Internet.
PLA算法可以有效地对网络中传输的数据包进行协议分析,解决了如何判别在网络上传输的数据包是什么类型的数据包,每一个数据包都用到了哪些协议。
PLA can effectively process protocol analysis for datagram packets. It's a solution to distinguish the types of the datagram packets and which protocols the datagram packets use.
PLA算法可以有效地对网络中传输的数据包进行协议分析,解决了如何判别在网络上传输的数据包是什么类型的数据包,每一个数据包都用到了哪些协议。
PLA can effectively process protocol analysis for datagram packets. It's a solution to distinguish the types of the datagram packets and which protocols the datagram packets use.
应用推荐