• As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.

    前面所启用WebSphereApplicationServer安全性使得大多数内部传输使用ssl保护不受各种形式网络攻击

    youdao

  • Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).

    如果系统服务不可用,合法用户无法使用攻击系统上网络服务(2)。

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • E-commerce became an attack against the network bank hot spots, the attack also more apparent, Trojan virus staring online trading links from virtual value theft to direct financial crime.

    电子商务便成为攻击热点针对网络银行攻击更加明显木马病毒紧盯在线交易环节虚拟价值盗窃转向直接金融犯罪。

    youdao

  • Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.

    下面一些加强路由器安全的具体措施,用以阻止路由器本身攻击防范网络信息窃取

    youdao

  • The research of modern network security is mainly from the view that how to prevent the attack.

    现代网络安全研究主要是从如何防止攻击角度来进行的。

    youdao

  • This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.

    该文计算机网络安全防御措施展开指出常见网络攻击及其防御措施。

    youdao

  • The severity of the network attack mean the degree of danger suffered by whole system from network attack.

    网络攻击危害是指网络攻击整个应用系统造成危害的程度

    youdao

  • It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.

    通过监测计算机网络计算机系统实现内部攻击外部攻击和操作的实时保护,并收集的信息进行分析。

    youdao

  • The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.

    发明涉及一种用于保护网络免于来自用户安全攻击并且尤其是对于第2交换机而言免于MAC洪流攻击的方法

    youdao

  • Now we construct such a trap network it can lure attackers and have them spend time and resource attacking this trap, protecting production resources from attack.

    在这里我们构建了了这样一种诱骗网络可以诱惑攻击者,使他们时间资源花费攻击诱骗陷阱上,从而保护工作系统免于攻击

    youdao

  • For network security, it is important to defend from DOS attack.

    如何防御DOS攻击网络安全中一个重要的方向。

    youdao

  • This paper investigates network security problems from the point of view of the evaluation of network attack effect.

    该文评估网络攻击效果角度研究网络安全问题

    youdao

  • Protects the network from known attack signatures by preventing them from reaching their targets.

    保护防止他们实现目标已知攻击特征网络

    youdao

  • For example, the attack from the network is the main threat of security, while the network attack uses all kinds of technique and means with the purpose of using the leak of the system.

    其中网络攻击最主要安全威胁。网络攻击的各种技术方法,都是企图利用系统漏洞

    youdao

  • Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.

    入侵检测技术就是这样一动态策略通过网络系统实时监控,来达到动态保护目的。

    youdao

  • Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.

    无线传感器网络应用二元多项式密钥预分配协议通常容易遭受到敌方合谋攻击

    youdao

  • The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.

    发明有效地降低攻击算法开销,在提高发现网络攻击准确度的同时,不会降低发现过程时效性

    youdao

  • The experimental results show that the approach is capable of correctly distinguishing the attack codes from regular network flows.

    实验结果表明方法准确识别网络数据中的多态溢出攻击代码

    youdao

  • Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

    下面哪种加密技术可以最好保护无线网络遭受中间人攻击

    youdao

  • The basic security strategy for any automation system is to manage user and network access to the system to protect the controller from attack.

    用于任意自动化系统的这项基本安全策略用于管理用户网络进入系统以保护控制器收到攻击。

    youdao

  • With the popularization of the network and the increasing attack from hackers, network security problem is becoming more serious.

    随着网络普及黑客攻击增加,网络安全问题变得日益严重。

    youdao

  • This model protects the active network node from the attack of vicious capsule with authentication, authorization and active capability loads strategy dynamically.

    模型采用认证授权、主动权能动态加载策略等安全措施保护主动节点资源免受恶意信攻击

    youdao

  • Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.

    网络流量异常网络流量行为偏离正常行为情形具有发作突然先兆特征未知特点,有可能在短时间内给网络及其设备带来极大的伤害。

    youdao

  • Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.

    网络流量异常网络流量行为偏离正常行为情形具有发作突然先兆特征未知特点,有可能在短时间内给网络及其设备带来极大的伤害。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定