火墻術 的英文怎麼說

中文拼音 [huǒshù]
火墻術 英文
fire field
  • : fire
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防的相關技基礎,分析了透明代理作為一種先進易用的防的原理,闡述了linux操作系統網路數據包攔截技和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技包括路由器、防、漏洞防堵、入侵檢測、審計和反攻擊等,其中路由器過濾、防、漏洞防堵屬于靜態安全技,而入侵檢測、審計和反攻擊等屬于動態防護。
  4. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph

    入侵檢測是一種主動防禦技,它彌補了防、信息加密等傳統安全技的不足。
  5. Then it describes the software framework of the firewall system in data plane. the fifth chapter is about the dynamic packet filter ' s design and implementation. dynamic packet filtering technique greatly enhances packet filter ’ s efficiency and security

    第五章是動態包過濾模塊的設計與實現,包過濾是整個防功能中最核心的部分,動態包過濾技大大提高了包過濾的效率和安全性。
  6. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有系統作出了系統化的安全方案,包括應用防、 vlav技和windows2000 )系統的安全機製作出的網路和系統平臺,防病毒和系統備份方案,根據公司中心機房建設的規模,以及中心機房所在地的現場條件,分別就空調系統、后備電源系統、防雷擊和系統監控給出實施方案。
  7. Predominating how to use mainstream fire wall and vpn install technique under the complete network environment of actual application

    掌握主流防和vpn服務安裝技及在完整網路環境下的實際應用。
  8. In the progress of formulate the module, many advanced technologies and methods, such as nat and vpn, are adopted. the impletion of module covers three kinds firewall module. this paper has special value on the research above electronic business security framework

    在設計過程中,運用了nat 、 vpn等先進的技和方法,採用常用的三種防模式(軟體防、硬體防和軟硬體相結合的方式) ,對模型中的主要模塊具體實現,最終建立一個結構合理、功能完善、經濟適用的防系統。
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技、防系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. Robert s specialties include network infrastructure design with the cisco and nortel product line, network security design and management with ciscosecure and pix firewalls, network management and troubleshooting with ciscoworks, ciscosecure, sniffer - based technologies, and hpov

    Robert的專長包括使用cisco和nortel產品系列進行網路基礎設施的設計使用ciscosecure和pix防進行網路安全性設計和管理使用ciscoworks ciscosecure基於嗅探器的技以及hpov進行網路管理和故障診斷。
  11. At last, this paper studies another important issues in np, which is the local resource schedule optimization, and presents a new multi - processors schedule optimization algorithm, named forecasting - based load balance hash dispatch algorithm ( flbhda )

    本文的研究課題受到intelixa大學研究計劃的支持,並作為國家高科技技發展計劃( 863計劃)支持的引導項目課題- 「基於網路處理器的ipv6硬體防」研究的一部分。
  12. In the first part, i held the opinion that there are five main elements in software modeling : homostasis and isomorphic mapping, leveling, extension, priority of the big probability thing and efficiency. i brought forward my own modeling and development model, homostasis and isomorphic mapping - based, leveling, use case - dived, and parallel modeling and development model. beside these, there are introduction about rapid prototyping technology and uml

    該論文分建模理論和實踐兩部分,在建模理論部分提出建模活動中的五大要素:同態同構問題、分層次問題、可擴展問題、大概率事件優先問題及效率問題,並對此進行詳述;進一步提出自己的應用uml進行軟體建模開發模型;基於同態同構的、分層次的、用況驅動的并行開發模型,此外還對uml及原型化技進行簡單介紹,對該防的核心技? ? windows2000防網路封包過濾原理進行詳細探討。
  13. The research of initiative firewall based honeypot

    基於蜜罐技的主動型防的研究
  14. Provide reliability and security. parallel servers, hardware redundancy, fail - safe technology, information encryption, and firewalls can enhance this requirement

    提供可靠性和安全。并行服務系統,硬體冗餘,故障自動保險的技,信息加密,並且防都可能會提高對這方面的要求。
  15. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界防及現有主機防的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防,設計了一種企業網中的主機防模型,並對這一模型進行了較深入地研究。
  16. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動防禦技,彌補了傳統的以防為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。
  17. Intrusion detection, an important supplement to the firewall, should combine with the firewall to build a better security system

    因而需要將防與入侵檢測技相結合,來構造一個比較完善的防禦系統。
  18. Network driver technology is used in kernel mode. currently, most personal firewalls use ndis hook driver technology. however, ndis hook greatly depends on platform, so developers need to judge os version so as to use some undocumented structures

    目前大多數個人防採用內核模式的ndishook驅動程序技,但是,這種技對平臺的依賴性比較大,需要在程序中判斷操作系統的版本而使用一些未見文檔的結構定義。
  19. Architecture and key technology of np framework giga - rate firewall

    架構千兆線速防的體系結構與關鍵技
  20. After these discussions, we ' ll focus on the implementation of traffic control on the linux operating system, including the new queue processing, new packet classify processing, the interface to the traffic control, the modification of network adapter driver. this thesis consists of five chapters. the first chapter analyzes the rapid development and the traffic control requirements of the distributed parallel firewall system, and points out the necessity for the implementation of load balance in distributed parallel firewall system

    為了解決以上問題,本文首先描述了整個分散式并行系統的邏輯結構,然後分析了現階段的linux自身的流量控制機制和流量分發技;接著重點描述了分散式并行防系統的流量控制和分發機制的整體設計以及相關的關鍵技的研究和實現,主要包括下面的內容: linux自身的流量控制機制的改進、整個系統流量負載均衡的實現、網卡驅動程序的修改等。
分享友人