Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.
接着,为了防止恶意代码发现和攻击,本文利用硬件虚拟技术为LAHF设计了自隐藏模块。
If attack exists, state information management module will dynamically allocate and manage the firewall rules to filter the related data packets based on the control message.
如果存在攻击,状态信息管理模型根据接收到的控制信息添加阻断规则以实现动态响应。
At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.
最后,在仿真实验中模拟了现实环境中恶意用户的攻击过程,来测试该信誉模型防御SPIT攻击的性能情况。
At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.
最后,在仿真实验中模拟了现实环境中恶意用户的攻击过程,来测试该信誉模型防御SPIT攻击的性能情况。
应用推荐