不难想象,本文可选择的攻击类型范围很广。
The variety of attacks to choose from for this article was great, as you can imagine.
我们讨论了一些常见的攻击类型和这些攻击所带来的后果。
We discussed some common types of attacks and the results that attackers can obtain.
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
描述常见的网站安全攻击类型以及如何帮助阻止这些攻击。
Describes common types of Web-site security attacks and how to help prevent them.
贝叶斯分类模型是入侵检测中用于攻击类型分类的有力工具。
Bayes classifier model is a powerful tool for classifying attack types in intrusion detection.
也就是说,它们只能很好的验证那些工具发行者已知的攻击类型和数量。
That is, the validation they perform is only as good as the number of attack vectors known to the publishers of the tool.
每个级别防范不同的攻击类型,并提供对攻击者更有效的屏障。
Each level tries to thwart different types of attacks and also provides more barriers to attackers.
说明常见的网站安全性攻击类型和利于避免受到攻击的方法。
Describes common types of Web site security attacks and how to help prevent them.
在这四种主要分类中又有一些不同的攻击类型,稍后我们将对它们进行介绍。
There are several types of attacks within these four broad classifications, which we will look at in a minute.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
攻击类型的技能消耗的能量较少,而防御类型的技能会消耗大量的能量。
The energy bar has been designed to be favorable to use offensive skills and less favorable to use defensive skills. Tactically moving out of combat can drain energy quickly.
还需要使用前面介绍的针对不同攻击类型的其他监视类型以及配置来确保与服务级协议的兼容性。
Other types of monitoring for the types of attacks mentioned above are also needed, as well as configurations to ensure compliance with service-level agreements.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
要点是,有很多不同类型的入侵者、很多不同的入侵动机以及(我们后面将会看的)许多不同的攻击类型。
The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.
这样可以防止最恶劣的攻击类型(入侵者可能使用内置管理基础设施来将恶意应用程序部署到您的桌面上)。
This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.
如您所见,有很多不同类型的入侵者、很多不同的动机,以及(我们后面将要讨论的)许多不同的攻击类型。
As you can see, there are many different types of intruders and motivations and, as we will discuss later, many different types of attacks.
其中有些攻击类型是比较常见的,这些相同的攻击类型会出现在任何可以远程访问的服务中(例如,消息篡改)。
Several of these attack types are familiar; these same types of attack occur with any remotely accessible service (for example, message tampering).
传统的入侵检测方法在面对多变的网络结构时缺乏可扩展性,而且在未知的攻击类型面前也缺乏适应性。
Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.
本文首先对冗余事件的关联特征进行系统的分析,包括攻击类型关联特征、空间关联特征、时间关联特征。
This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.
这些攻击类型是最危险的,因为它们要求的技能很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous because they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
详细的攻击日志——HDIV记录它检测到的每次攻击的信息,信息包括:url、用户名、IP地址和攻击类型。
Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.
这些攻击类型是最危险的,因为它们需要的技能往往很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous, as they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。
There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.
这种类型的攻击只可能在数据库或密码存储已经暴露的情况下进行。
This type of attack is only possible if the database or password store is already compromised.
这样可以防止某些类型的攻击,但同时可能也会禁止对某些合法文件的请求,如带有非英文名的文件。
This can prevent certain types of attacks, but it may also block out requests for certain legitimate files, such as files with non-English names.
这种类型的攻击是不会造成信息泄露或者服务破坏的。
These types of attacks do not result in data being stolen or servers being breached.
这种类型的攻击是不会造成信息泄露或者服务破坏的。
These types of attacks do not result in data being stolen or servers being breached.
应用推荐