解码网络传输最复杂的是网络数据包中信息的级别。
The primary complexity behind decoding network transmission is the levels of information that are provided within the network packets.
通过snoop的输出,我们必须从原始网络数据包信息中提取每一个数据块。
As with the output from snoop, we have to extract each of the blocks of data from the raw network packet information.
网络数据包捕获技术,是实现入侵检测、网络安全审计的关键技术。
Packet capture is the key technology of intrusion detection system and network security audit.
同时减少了一次网卡驱动程序向用户空间复制网络数据包的系统调用。
At the same time reduced a net card driver to the user space duplication network data packet system call.
本系统的开发就是为了给网络使用者提供一个有用的网络数据包分析工具。
The development of the system was to provide the users with a useful tool that analysis the network packets.
基于网络的入侵检测系统根据网络流量、网络数据包和协议分析来检测入侵。
Network-based intrusion detection system is based on network traffic, network protocol analysis and packet data to detect intrusion.
流量统计模块将接收到的网络数据包分别放到不同的缓冲队列中等待检测处理。
The network packets are delivered into separated buffer queues to be detected by the traffic statistics module.
实验结果表明,该模型可以较好地检测异常的网络数据包,具有较好的自适应性。
Results show that this model can detect abnormal data packets well, and has a better self adaptability.
在整个设计中作者分析和实现了网络数据包捕获技术、协议分析技术和数据库存储。
The author designs and realizes the technology of getting the network data, the protocol analysis and the database storage.
然后在介绍了分层网络数据包的类型及结构的基础上,给出数据包分析处理类的设计。
Then, It introduces the types and structures of packets and presents the design of packet analysis class.
编写宿主内核和客户内核之间的内核到内核的网络数据包注入(injection)。
Writing kernel-to-kernel network-packet injection between the host kernel and the guest kernel.
为理解应用程序代理,来看一看这样的脚本,在此脚本中你需要递交一个小的干净的网络数据包。
To understand the application proxy, consider this scenario where you needed to deliver your neat little package of network data.
该系统以TCP/IP协议为基础,单片机通过ISA总线与网卡通信来实现网络数据包的收发。
The receiving and transmission of network frames are implemented through the ISA bus between MCU and the network card.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
所以在本例中,我们首先需要从原始网络数据包中提取Ethernet数据包,包括数据有效负载。
So in this example, we first need to extract the Ethernet packet, including the data payload, from the raw network packet.
经过实验证明,本系统能够有效拦截、监控及处理所有网络数据包,保证信息传输的合法性及安全性。
The experiments prove that the system can capture and monitor all network packets effectively, and achieve the validity and security of information transmission.
系统分为四个模块:计算机在线检测模块、计算机端口扫描模块、远程安装模块、网络数据包控制模块。
The system divides into four modules: on-line computer examination module, computer port scanned module, remote installation module and network control module.
traceroute工具与ping工具相关,它通常提供网络数据包传输所经过的每个路由器的ping时间。
Related to the ping tool, the traceroute tool will normally provide you with the ping times for each router that the network packets travel through to reach their destination.
tcpdump工具是一个比较老的工具,它从网上“嗅探”网络数据包,打印到stdout或记录在一个文件中。
The tcpdump tool is an older tool that "sniffs" network packets from a network and either prints them to stdout or logs them to a file.
它具有实时数据流量分析和日志ip网络数据包的能力,能够进行协议分析,是网络安全领域的一个新兴的热点。
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.
网络数据包截获机制在其它领域也有广泛的应用,该研究提出的设计思路对于相关开发人员具有重要的参考价值。
Since packet capture method is also used in many other fields, such as network monitoring system, the programming frame has great values to relative researches and developments.
基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
处理来自tcpdump的另一个方法是将原始网络数据包数据保存到一个文件中,然后处理这个文件以便查找和解码出您想要的信息。
Another way to process the content from tcpdump is to save the raw network packet data to a file and then process the file to find and decode the information that you want.
入侵检测模块将根据网络数据包捕获模块上接收到的包并结合网络入侵规则库进行分析,把分析的结果传递给系统管理模块。
Network intrusion detection module will analyze the package from data packet capture modules and combine network intrusion rule database, and then transmit the results to the system management module.
通过对网络数据包的分析,挖掘出网络系统中频繁发生的行为模式,并运用模式相似度比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。
By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.
本文介绍了NDIS驱动程序结构,给出NDIS中间驱动程序实现网络数据包的拦截方法;并实现了一个基于规则的过滤算法,在过滤算法中引入了一个分层框架。
Network data packets are captured by NDIS Intermediate driver; A rule-based filtering algorithm is presented in this paper, and a layered filtering framework is included in the algorithm.
该网络使用TCP/IP 协议发送离散的数据包来传输信息。
The internet sends information as discrete packets of data using a suite ofprotocols known as TCP/IP.
它对流经网络的每个IP数据包进行身份验证和加密。
It authenticates and encrypts each IP packet flowing through the network.
它对流经网络的每个IP数据包进行身份验证和加密。
It authenticates and encrypts each IP packet flowing through the network.
应用推荐