...络安全;伪装攻击;入侵检测; shell 命令;异常检测; Markov 链 [gap=1670]Key words: network security; masquerade attack; intrusion detection; shell command; anomaly detection; Markov chain ..
基于26个网页-相关网页
... 中间人 (Man in the Middle) 中间人攻击 (Man in the Middle Attack) 化装 (Masquerade) 化装攻击 (Masquerade Attack) Melissa 病毒 (Melissa Virus) 信息验证码 (Message Authentication Code) 信息分类 (Message Digest) 信息完整性检测码 ...
基于20个网页-相关网页
·2,447,543篇论文数据,部分数据来源于NoteExpress
Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.
本文主要讨论如何通过网络伪装来防御操作系统的真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞的攻击。
应用推荐