密码协议分析与设计的基础是对其进行形式化建模。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
网络协议的形式化模型是协议分析和设计的核心技术之一。
The formal models of network protocols are one of the core technologies in the analysis and design of the protocols.
因此密码协议设计和密码协议分析是信息安全领域的难题。
The design and analysis of cryptographic protocols are notoriously complex and error prone.
在协议分析模块中,分析和比较了三种常见的会话重建技术。
In this module, the paper analyses and compares three common session rebuilding technologies.
这些工具能够帮您捕捉和解码数据包,通常也能为您执行大多数的协议分析。
These provide a combination of both capturing and decoding content for you, often performing the bulk of the protocol analysis process for you.
Ethereal是一个专业的协议分析软件,它可以帮助调试应用层协议。
Ethereal is a professional protocol analyzer that can help debug application layer protocols.
本文提出了一种基于半马尔可夫模型的VHF信道访问协议分析方法。
A new method of VHF channel access protocol analysis based on semi-Markov model is presented in this paper.
针对模式匹配算法带来的高漏报率和误报率,引入了协议分析的方法。
This paper introduced one method called protocol analysis due to the high false acceptance rate and high alarm rate caused by pattern match algorithm.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
协议分析和协议综合是实现协议验证的两种有效途径,前者更为有效和实用。
The analysis and synthesis of protocols are two efficient approaches to verify protocols; the former is more efficient than the latter.
Wireshark(以前称为Ethereal)是一个多平台网络协议分析器。
Wireshark, formerly known as Ethereal, is a multiplatform network protocol analyzer.
协议分析是目前多数入侵检测系统所采用的技术,用以弥补单纯的模式匹配的不足。
Protocol analysis is the main technology that the IDS adopts at present, used to remedy the deficiency of the simple mode matches.
在整个设计中作者分析和实现了网络数据包捕获技术、协议分析技术和数据库存储。
The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
吉姆团队采取了三种不同的分析方法——意图治疗分析,改良的意图治疗分析,以及居前协议分析。
Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
本文主要讨论了在虚拟专用网络系统中协议分析模块、异步加密模式和SADB的实现。
Protocol analysis module, asynchronous encryption and SADB realized are discussed in the system of virtual private network.
采用形式化方法分析安全协议是协议分析的有效手段,近年来,出现了众多的研究方法。
Using formal method to analyze security protocol is a valid method to the analysis of security protocols. In recent years, a lot of formal methods appeared.
串空间模型是安全协议分析的一种重要工具,它具有良好的语义,但其分析过程难度较大。
The strand space model is a very important tool of analyzing security protocol, and it has good semantics, but it is difficult to analyze security protocol.
分析引擎使用了协议分析和模式匹配相结合的检测方法以及改进了的匹配算法,提高了检测速度。
It is analysis engine that use protocol analysis and mode match method which combine together, and improved match algorithm, improve the speed of detection.
组合事件生成引擎中应用层的协议分析和脚本的分析能力可以提供非常准确强大的入侵检测功能。
Make up incident turn into engine employ agreement analysis and analytical capacity of script of layer can offer accurate strong invasion measure the function.
参与整体方案需求分析,进行监控中心、协议分析模块、流过滤模块、入侵检测模块的分析与设计。
Participation in the overall program requirement analysis, monitoring center, protocol analysis module, flow filtration module, intrusion detection module analysis and design.
设计了一个入侵检测系统的基本框架,并深入探讨了其中的包捕获机制、包过滤机制和协议分析机制。
It deeply probes into the packet capture module, packet filter module and protocol analysis module of a IDS.
在协议分析的基础上,采用IP数据包分片重组、TCP数据流还原等技术,降低漏报率,减少误报率。
On the base of protocol analysis, the system USES the technology of the fragment reassembly of IP packet, TCP data flow reverting, etc. It reduces leak and mistake alert of the intrusion.
本文在对DHCP协议分析的基础上,对DHCP二级代理机制进行了探讨,并给出了具体的实现过程。
Discusses the DHCP two-level proxy mechanism based on the analysis of DHCP, and introduces the realization process in detail.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
协议分析者可以用该逻辑来对安全协议进行分析,而协议设计者可以使用该逻辑用一种系统的方法来构造安全协议。
Protocol analyser can analyse security protocol by the logic, and protocol designer can construct security protocol by the logic in a systematic way.
论文对TCP/IP协议中数据封装的过程进行了详细的分析,并在此基础上设计和实现了一个分层的协议分析模块。
The detailed analysis of data packet in TCP/IP protocol suite is given out. On the basis of it, a layered protocol analysis module is designed and realized in this paper.
计算机网络基础课程是高等院校计算机相关专业的重点课程,网络协议分析是计算机网络教学体系当中的一个重要环节。
Computer network course is the key lesson in relative speciality of higher schools, and protocol analysis is a main link in the teaching system of computer.
计算机网络基础课程是高等院校计算机相关专业的重点课程,网络协议分析是计算机网络教学体系当中的一个重要环节。
Computer network course is the key lesson in relative speciality of higher schools, and protocol analysis is a main link in the teaching system of computer.
应用推荐