檢測埠掃描 的英文怎麼說

中文拼音 [jiǎnsǎomiáo]
檢測埠掃描 英文
port scan
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : 名詞1. (碼頭) pier; port; wharf; jetty 2. (有碼頭的城鎮) port city3. (商埠) commercial port
  • : 掃構詞成分。
  • : 動詞1. (照底樣畫) copy; depict; trace 2. (在原來顏色淡或需改正之處重復塗抹) retouch; touch up
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  1. Firstly, the interrelated knowledge about network security vulnerability is introduced in this thesis, include definition, cause of formation, character and attribute, sort and detecting method. different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis. then, the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared

    本論文首先介紹了網路安全漏洞的相關知識,包括漏洞的定義、成因、特徵和屬性、分類及方法,對各種技術及其特點進行了分析和比較,介紹了三種探操作系統的指紋技術,並分析了它們的優缺點。
  2. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於的預處理功能,對基於關鍵字模式匹配的誤用技術作了深入地分析,並對基於數據挖掘的異常系統進行了探討,整個系統的與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  3. In misuse mode, modules such as port - scanning, sniffer, and ip spoofing have been implemented

    在誤用模式中系統設計了dos攻擊、 spoofing攻擊、網路欺騙、嗅探模塊。
  4. That is to say, an entrance will confront to all users, any users can connect this server from client computer through this port

    即通過一些方法到一臺主機的一段特定是否提供相應的服務。
分享友人