您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
You know that Snort is an intrusion detection system, but how does it detect intrusion?
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
使文件不可变通常是安全或者入侵检测工作的一部分。
Making files immutable is often done as part of a security or intrusion detection effort.
这种攻击的想法是找出特定目标主机上打开的端口,但完成的方式非常狡猾,因此被攻击的主机或质量低劣的入侵检测工具不会发现。
The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor-quality intrusion detection tool may not notice.
作者很快得出了两个重要的主题:入侵检测系统,IDS,和旁路过滤。
The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.
入侵检测以及安全日志审核。
在本文中,我将越过基本的安装和配置知识,讨论如何设置Snort,以检测与Web相关的入侵。
In this article, I'll go well beyond installation and configuration, and talk about how to set up Snort to detect Web-related intrusions.
确实,入侵检测和Snort的使用都超越了Web站点本身,延伸为更广泛的网络安全问题。
It's true that both intrusion detection and Snort usage extends well beyond Web sites and into larger network security issues.
作为Web开发人员,没有必要成为Snort专家,也没有必要将20%的Web开发时间投入到入侵检测的工作之中。
As a Web developer, there's no reason to become a Snort expert, or budget 20% of your Web development time to intrusion detection.
部署Monit以检测入侵。
Snort:一种入侵检测工具。
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。
Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
其入侵检测和防护能力包括数字版权管理、P2P和IM(即时通信)控制。
The SonicWALL’s intrusion detection and prevention abilities include digital rights management, P2P and instant messaging controls.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
Brijot响应HMRC的非入侵技术的要求,能够检测可能藏在乘客衣服下的物体。
Brijot responded to HMRC's request for a non-invasive technology that is capable of detecting objects that may be concealed beneath garments worn by passengers.
入侵者也可以检测硬件驱动器来搜索任何存储的密码。
The intruder can also scan the hard drive to detect any stored passwords.
入侵检测:从很大程度上讲,入侵检测实际上就是结合了包嗅探和记录功能,并在其上添加一层自动智能层。
Intrusion detection: in lots of ways, intrusion detection is just packet sniffing combined with logging, with a layer of automated intelligence thrown on top of it all.
讨论了如何检测这类威胁,考察了如何减轻该威胁,最后讨论了如何应对可疑的入侵。
It discusses how to detect such threats, looks at what you can do to mitigate the threat, and finally discusses what you can do in response to a suspected penetration.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
为了满足网络流量和速度的增大,设计高性能的入侵检测引擎将成为一项紧迫的任务。
For satisfying the increasing network traffic and speed, design the high performance intrusion detection engine will become an urgent mission.
生物免疫系统的自我保护机制对设计新的网络入侵检测系统具有很好的借鉴意义。
The protection mechanism of the natural immune system has brought us inspirations for designing a novel network intrusion detection system.
本文研究并设计了一种基于规范的入侵检测方法。
The thesis researches and designs the method of intrusion detection based specification.
主机入侵检测系统在保护主机方面起着非常重要的作用。
Host intrusion detection system (HIDS) is very important in the field of protecting the host.
Grosse:确实,那些谈论网络中的入侵检测、恶意软件检测或深度包检测的法规正逐渐被当前技术潮流所忽略。
Grosse: I agree that regulations that would talk about intrusion detection or malware detection or deep pack-et inspection on the network really are being passed by with current technology trends.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
目前,入侵检测技术研究的重点集中在无需指导的异常检测上。
At present, the researching emphasis of intrusion detection technology centralizes in anomaly detection without instructions.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
应用推荐