入侵检测通过收集各种网络数据,从中分析和发现可能的入侵攻击行为。
Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.
与此同时,这些重要的信息网络系统面临入侵攻击的威胁,而操作系统和应用服务程序的漏洞正是攻击者实施攻击的基础。
Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.
本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。
There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.
如果被捕食者或者入侵的克林贡人攻击,他会怎么做?
What would he have done if attacked by a predator or an invading Klingon?
一种非常有攻击性的蚂蚁——洛玛蚂蚁,最近入侵了一个特定的区域,它们的刺有毒,对人类往往是致命的。
A very aggressive species of blank ant, the Loma ant, which has recently invaded a certain region, has a venomous sting that is often fatal to humans.
大自然保护协会还向众多入侵物种发起了宣战,从羊群到植物,再到具有攻击性的阿根廷蚁。
The Nature Conservancy has declared war on a multitude of invasive species here, from sheep to plants to the aggressive Argentine ant.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
人类邪恶的一面使得总有人会滥用其计算机技术去实施攻击和入侵,那么就是试图去破坏计算机系统。
That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.
CSRF攻击由一个入侵站点的恶意代码发起,该代码欺骗浏览器,使其将无关的请求传输到一个受信任站点。
CSRF attacks originate from malicious code from an intruder site that tricks a browser into transmitting unprovoked requests to a trusted site.
但事实刚好相反,现在谷歌收到了攻击入侵。
Instead it was the opposite. And now Google was under attack.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
关键的问题是入侵者是使用定义良好的API和协议来进行攻击的。
The key is that the attack is executed using well-defined APIs and protocols.
当然,为了阻止入侵者猜密码或者强制攻击这些密码,最好确保该设置与你的其他安全策略一起使用。
Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
浏览器的同源策略无法阻止CSRF攻击,因为攻击请求被传输到第三方入侵站点的代理中相同的源。
The browser's same-origin policy does not prevent CSRF attacks because the attack requests are transmitted to the same origin in proxy for the intruding third-party site.
当unix计算机受到入侵时,常见的情况是日志文件被删除,以掩盖攻击者的踪迹。
A common thing that happens when a UNIX machine is broken into is that the log files are deleted to cover the attacker's tracks.
百度昨日发表声明,指出黑客并未直接入侵百度服务器,而是攻击了美国的域名注册商。
In a statement yesterday, Baidu noted that attackers did not try to break into the servers of Baidu but attacked the domain name registrar used by Baidu, which is based in the us.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
攻击的目标包括花旗集团、洛克希德·马丁(Lockheed Martin),甚至连给大公司制作令牌密码来防御入侵的RSA公司无法避免。
Targets have included Citigroup, Lockheed Martin and even RSA Security, which makes password tokens that big companies use to protect themselves from intrusion.
如您所见,有很多不同类型的入侵者、很多不同的动机,以及(我们后面将要讨论的)许多不同的攻击类型。
As you can see, there are many different types of intruders and motivations and, as we will discuss later, many different types of attacks.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
另一种更狡猾的攻击方法是,入侵者可以修改通过HTTP返回的任何页面——甚至包括页面中嵌入的URL。
An even more subtle attack is that any page returned over HTTP can be potentially altered by an intruder — even URLs embedded in the page.
在一个CSRF攻击过程中,请求源自一个入侵的第三方站点并通过一个已验证的浏览器页面传递到服务器。
During a CSRF attack, requests originate from an intruding third-party site and are passed through an authenticated browser page to the server.
在CSRF攻击过程中,请求来自一个入侵者站点,然后通过一个经过验证的浏览器页面传输到服务器。
During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.
这为公司提供了广泛的视点观察各种攻击,其中包括侦察、入侵、破解、指挥控制和横向运动等。
This provides the Corporation with a full range of vantage points to observe attacks, including: reconnaissance, intrusion, compromise, command and control, and lateral movement.
这种攻击的想法是找出特定目标主机上打开的端口,但完成的方式非常狡猾,因此被攻击的主机或质量低劣的入侵检测工具不会发现。
The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor-quality intrusion detection tool may not notice.
器官移植后,T细胞把捐赠器官当作‘外来入侵者’进行攻击。
After organ transplants, t cells can attack the donor organ as a 'foreign invader'.
要点是,有很多不同类型的入侵者、很多不同的入侵动机以及(我们后面将会看的)许多不同的攻击类型。
The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.
要点是,有很多不同类型的入侵者、很多不同的入侵动机以及(我们后面将会看的)许多不同的攻击类型。
The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.
应用推荐