因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
在‘形式分析的承诺’这个小节中讨论了一个攻击流分析阶段的例子。
An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.
文中还结合实验结果对增强剪切攻击鲁棒性的技术进行了分析。
A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.
由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。
Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
第四章简单介绍了当前一个主流的攻击方法—快速相关攻击,并结合熵分析对广义自缩序列的安全性进行了讨论。
In chapter four, a brief review of fast correlation attacks is given, then an attack to generalized self-shrinking sequences is discussed by combining with entropy analysis.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
本文首先对冗余事件的关联特征进行系统的分析,包括攻击类型关联特征、空间关联特征、时间关联特征。
This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.
通过分析发现,利用攻击树模型对信息系统安全进行度量,是比较好的选择。最后对本模型的特点进行了讨论。
Throughout analysis, the attack tree model is a good choice to describe the information system security, finally, discusses the characteristics of this model.
提出了一种由数据分析、特征滤波器、假设检验、融合决策等过程组成的隐藏攻击方法。
In the end, the paper proposed a way of hiding attack technique composed by data analysis, characteristic filter, hypothesis inspection and syncretism decision-making.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
差分功耗分析(DPA)作为一种获取密码芯片密钥的旁道攻击方法,对目前的信息安全系统构成了严峻挑战。
Differential power analysis attack (DPA) is a powerful tool for retrieving secrets embedded in cryptographic devices and it has been a considerable threat to the information security system.
然而,攻击建模和威胁分析工具方面的研究仍处于摸索阶段。
However, insider attack modeling and threat analysis tools have not been evolved at the same rate.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。
To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
最后给出了对该类方案的已知明文的同态攻击方法,弥补了该类方案理论分析上的不足。
Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.
本文对ARP病毒的攻击原理做了详细的探讨和分析。
This article has made the detailed discussion and the analysis to the ARP virus's attack principle.
本文从计算机病毒及木马的起源及现状的分析开始着手,对上百种流行木马的常见攻击手段进行追踪分析,从中寻求其相似性。
This paper begins with the analysis of the origin and status of the Trojan viruses, then tracks and analyzes hundreds of popular Trojan common attack means to seek their similarity.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
以对现实世界中动物的行为分析为依据,建立了合理的敌对群体行为的通用攻击模型。
Based on the analysis of animals' behavior in the real world, reasonable universal attack models are established.
由于功耗分析实现简单,成功率高等优点,成为最具威胁的旁路攻击方法之一。
The power analysis attack is simple and has a high successful rate, is becoming one of the most effective side channel attacking methods.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
理论分析和仿真实验表明,该算法具有较高的安全保密性能和抗攻击性能。
Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。
The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.
网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。
The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.
应用推荐