这种“帮助”也可以帮助攻击者创建用于误导程序的数据。
This "help" can also aid an attacker to create data to mislead the program.
如果攻击者可以影响所返回的数据,就需要小心。
Be careful if an attacker could influence the data that's returned.
现在假设攻击者发送了超过buffer 1所能处理的数据。
Now imagine that an attacker has sent more data than buffer1 can handle.
这样可以让攻击者控制内部数据,甚至控制整个程序。
That will let the attacker control internal data and possibly take over the program.
攻击者可以利用这一点来“骗过”数据验证来攻击程序。
Attackers can use this fact to "slip through" data validators to attack programs.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
The second vulnerability has to do with using user-controllable data to control a business process.
处理用户的输入数据并让攻击者获取。
Process user input data and make it available to the attacker.
常见的攻击方式是消除数据、删除文件或者格式化硬盘。
The attack is to wipe out data. to delete flies. or to format the hard disk.
黑客通常利用“数据共享”这一方法对目标发起攻击。
然后,利用数据包捕获机制对攻击数据进行收集、分析和记录。
Then, using packet capture mechanism to attack the data collection, analysis and recording.
目前,人们通过收集攻击工具或编写攻击脚本来构造攻击测试数据集。
At present, people collect attack tools or develop attack scripts to construct such data.
根据我们掌握的调查数据。我们确信他们的攻击还未能达此目的。
Based on our investigation to date we believe their attack did not achieve that objective.
减少了数据维数,加快了数据分析,提高了准确率,并能够识别新型攻击。
This method can reduce dimension of data and improve speed of data process.
减少了数据维数,加快了数据分析,提高了准确率,并能够识别新型攻击。
This method can reduce dimension of data and improve speed of data process.
应用推荐