This article first introduces the basic concepts of network worms, and to present the significance of the research.
本文首先介绍了网络蠕虫的基本概念及其危害,提出了对网络蠕虫进行研究的意义。
First, we analyzed the feasibility of applying information entropy in the detection of network worms and conducted related tests.
首先分析了将信息熵应用于网络蠕虫检测的可行性,并进行了相关测试。
To improve the performance of parallel simulation of network worms, the simulation task of worms should be partitioned reasonably.
为提高并行网络蠕虫模拟的性能,需要对蠕虫模拟任务进行合理的划分。
Because of the huge damage of network worm epidemics, how to detect and response network worms has become an important task in computer network security field.
由于网络蠕虫泛滥产生的巨大危害,如何对网络蠕虫进行检测、预警和应对,已经成为计算机网络安全研究领域的一个重要课题。
Network worms can not only exhaust system resources of infected hosts and damage them, but also occupy network bandwidth and thus jam network, even disrupt whole network.
网络蠕虫的传播不仅可以占用被感染主机的大部分系统资源,对目标系统造成破坏,同时,还会抢占网络带宽,造成网络严重堵塞,甚至整个网络瘫痪。
The result of experiments shows that our adaptive worm detection algorithm can effectively detect the spread of network worms, and has a low false alarm rate and omission rate.
实验结果表明,本文所设计的自适应蠕虫检测算法能够有效的检测网络蠕虫的传播,且具有较低的误报率和漏报率。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
With the popularity of network applications, network worms become the focus of attention, how to detect worms and how to prevent its spreading and destruction has became a research hotspot.
随着网络应用的普及,网络蠕虫病毒成为人们关注的焦点,如何检测并阻止蠕虫病毒的传播和破坏也成为研究的热点。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
In recent years, the study on Internet worms has become one of the most active research topics in the field of network security and information security in the world.
网络蠕虫的研究已经成为近年来国际上在网络安全和信息安全领域最活跃的研究方向之一。
By deep analysis of the worms, the proportional relation between the propagation speed of worms and the scale of network is found.
通过对蠕虫的深入分析,发现了蠕虫的传播速度与网络的规模具有一定的关系。
It was bad enough when online threats came in the form of worms and viruses causing a company's computer network to crash or files to become corrupted.
以前,网络攻击以病毒和“蠕虫”形式出现,造成公司的网络瘫痪或者毁坏文件。这够糟糕了。
Finally, according to the characteristics of IM worms' propagation and the IM network, we introduce Client-Based and Server-Side-Based monitoring techniques, respectively.
根据病毒的传播特点和即时通讯网络的无标度特性分别提出了基于IM客户端的监控方案和基于服务器端的病毒监控方案。
As they access the corporate network, mobile and remote users inadvertently can infect the network with (75) and worms acquired from unprotected public networks.
当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒和蠕虫。
While the network security defense mechanisms continue to improve, worm also continues to improve its own propagation mechanisms and new worms continue to emerge.
伴随着网络安全防御机制的不断完善,蠕虫也在不停改善自身的传播机制,新的蠕虫不断涌现。
Using P2P download, spam, worms and other reasons in Today's campus network, cause a huge consumption of network bandwidth.
今天的校园网由于P 2 P下载、垃圾邮件、蠕虫病毒等原因,造成了网络带宽的巨大消耗。
Using P2P download, spam, worms and other reasons in Today's campus network, cause a huge consumption of network bandwidth.
今天的校园网由于P 2 P下载、垃圾邮件、蠕虫病毒等原因,造成了网络带宽的巨大消耗。
应用推荐