• 这种技术常常用于帮助防御基于ARP的中间人攻击

    It can often help prevent ARP-based Man-in-the-Middle attacks.

    youdao

  • 如何辨别防御攻击增强网络安全已成为网络运营商技术管理人员甚至普通网络用户研究问题

    Howdistinguishes defense and attack and enhancing network security are the questions researched by network operation businessmen and technical management personnel, even ordinary network users.

    youdao

  • 尽管技术攻击变得更具破坏性,让防御变得更为复杂安全基础以往一样重要

    Although technology has made the attack more disruptive and more sophisticated, the security base is still as important as ever.

    youdao

  • 目前传统被动防御技术无法应对不断增加大规模网络攻击行为

    Now traditional passive defense technology will not reply the behavior of unceasing increase large-scale network attack.

    youdao

  • 网络攻击带来经济损失越来越严重促使人们不得不越加重视网络安全防御体系相应技术研究

    The economic losses brought with network attack is also serious, this makes people have to aggravate the more regard the research for network safe defence system and corresponding technology.

    youdao

  • 一方面,蜜罐作为一种新兴主动防御技术具有收集数据价值检测到未知攻击优点

    On the other hand, honeypot as a new defense initiative technology has a lot of advantages, such as collecting a small amount of data, high value and capable of detecting unknown attacks and so on.

    youdao

  • 入侵检测作为一重要主动防御技术不但检测外来攻击能检测来自内部的入侵。

    Intrusion detection which is the most important initiative recovery security technology can detect not only the outer but also the inner intrusion.

    youdao

  • 信息安全核心技术在于攻防”,即攻击技术防御技术只有掌握攻击技术才能更好做到安全防御

    The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    youdao

  • 本文介绍了缓冲区溢出攻击基本原理关键技术总结了现有缓冲区溢出防御方法不足

    This thesis summarizes the deficiency of contemporary methods for defending the existing buffer overflow attacks and introduces the principle and major technology of buffer overflow attacks.

    youdao

  • 网络诱骗技术是对传统网络防御手段有效补充通过将网络攻击引向伪造的、虚假信息资源达到保护网络中真正有价值信息资源的目的。

    Network trap, which protects the valuable resource of information by guiding the attacker to imitative and illusive information, is an available makeup of traditional network defense.

    youdao

  • 通过使用技术结合网络组织架构检测网站攻击达到防御网站攻击目的

    This article uses the Honeynet technology together with the organization architecture for network and Detection Web Attack to achieve the target of avoiding the network attack.

    youdao

  • 通过使用技术结合网络组织架构检测网站攻击达到防御网站攻击目的

    This article uses the Honeynet technology together with the organization architecture for network and Detection Web Attack to achieve the target of avoiding the network attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定