As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).
如果系统或服务不可用,合法用户就无法使用受攻击系统上的网络服务(见图2)。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
E-commerce became an attack against the network bank hot spots, the attack also more apparent, Trojan virus staring online trading links from virtual value theft to direct financial crime.
电子商务便成为了攻击热点,针对网络银行的攻击也更加明显,木马病毒紧盯在线交易环节,从虚拟价值盗窃转向直接金融犯罪。
Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.
下面是一些加强路由器安全的具体措施,用以阻止对路由器本身的攻击,并防范网络信息被窃取。
The research of modern network security is mainly from the view that how to prevent the attack.
现代网络的安全研究主要是从如何防止攻击的角度来进行的。
This text launch from network safety and defense measures of calculator and pointed out familiar of four kinds of network attack and its defense measures.
该文从计算机的网络安全及防御措施来展开,指出了常见的四种网络攻击及其防御措施。
The severity of the network attack mean the degree of danger suffered by whole system from network attack.
网络攻击的危害度是指网络攻击对整个应用系统造成危害的程度。
It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
它通过监测计算机网络和计算机系统实现对内部攻击、外部攻击和误操作的实时保护,并对收集的信息进行分析。
The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.
本发明涉及一种用于保护网络免于来自用户的安全攻击并且尤其是对于第2层交换机而言免于MAC洪流攻击的方法。
Now we construct such a trap network it can lure attackers and have them spend time and resource attacking this trap, protecting production resources from attack.
在这里我们构建了了这样一种诱骗网络,它可以诱惑攻击者,使他们将时间和资源都花费在攻击诱骗陷阱上,从而保护工作系统免于攻击。
For network security, it is important to defend from DOS attack.
如何防御DOS攻击是网络安全中一个重要的方向。
This paper investigates network security problems from the point of view of the evaluation of network attack effect.
该文从评估网络攻击效果的角度研究网络安全问题。
Protects the network from known attack signatures by preventing them from reaching their targets.
保护,防止他们实现其目标,从已知的攻击特征的网络。
For example, the attack from the network is the main threat of security, while the network attack uses all kinds of technique and means with the purpose of using the leak of the system.
其中,网络攻击是最主要的安全威胁。网络攻击的各种技术和方法,都是企图利用系统的漏洞。
Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.
入侵检测技术就是这样一种动态策略,它通过对网络系统实时监控,来达到动态保护的目的。
Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol.
无线传感器网络在应用二元多项式密钥预分配协议时,通常容易遭受到敌方的合谋攻击。
The method effectively reduces the expenditure of the attack graph algorithm, and is free from reducing the timeliness of the discovering process while improving the network attack accuracy.
本发明有效地降低了攻击图算法的开销,在提高发现网络攻击准确度的同时,不会降低发现过程的时效性。
The experimental results show that the approach is capable of correctly distinguishing the attack codes from regular network flows.
实验结果表明,该方法可准确识别网络数据中的多态溢出攻击代码。
Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?
下面哪种加密技术可以最好的保护无线网络遭受中间人攻击?
The basic security strategy for any automation system is to manage user and network access to the system to protect the controller from attack.
用于任意自动化系统的这项基本安全策略用于管理用户和网络进入系统以保护控制器收到攻击。
With the popularization of the network and the increasing attack from hackers, network security problem is becoming more serious.
随着网络的普及和黑客攻击的增加,网络安全问题变得日益严重。
This model protects the active network node from the attack of vicious capsule with authentication, authorization and active capability loads strategy dynamically.
该模型采用认证、授权、主动权能动态加载策略等安全措施保护主动节点资源免受恶意信包的攻击。
Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.
网络流量异常是指网络的流量行为偏离其正常行为的情形,具有发作突然、先兆特征未知的特点,有可能在短时间内给网络及其设备带来极大的伤害。
Network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors, which has characteristics of a sudden attack and the unknown threatened characteristics.
网络流量异常是指网络的流量行为偏离其正常行为的情形,具有发作突然、先兆特征未知的特点,有可能在短时间内给网络及其设备带来极大的伤害。
应用推荐