防禦網 的英文怎麼說

中文拼音 [fángwǎng]
防禦網 英文
protection net
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • 防禦 : defense
  1. The research of network intruded crypt model p2mdr

    2路安全模型的研究
  2. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「路集成系統」 ,通過對路中各節點主機的火墻進行管理,在實現多機聯合領域進行了探索研究。
  3. We ' re past the firewalls, local defense nets, minutemen, subs

    我們通過了火墻、局部和支
  4. Updates to the site are made every five minutes and the so - called " norad tracks santa " program has german, spanish, french, italian, japanese and english links

    站每5分鐘更新一次,這個所謂的「北美太空司令部追蹤聖誕老人」節目具有德語、西班牙語、法語、義大利語、日語以及英語6種版本的鏈接。
  5. In the age of information, security system does not mean a simple pure protection, but the great rivalship between the security officers ( so ) and virtual attackers ( va ). some cyberspace security systems only give the defense framework, which is the integration of different protection technologies based on the system security management requirements, but not based on the understanding of information rivalry

    在信息技術高速發展的時代,路安全已不再是單純的技術,而越來越成為安全管理員( securityofficers , so )與虛擬攻擊者( virtualattackers , va )之間信息與知識的對抗。
  6. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於火墻和病毒軟體的主動機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動措施。
  7. Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )

    文中針對單系統、堡壘火墻屏蔽子、帶dmz (非軍事化區)帶三種不同路拓撲結構加以說明,闡述nat (路地址轉換)的原理和dmz工作原理以及它們的相應路拓撲結構。同時給出基於dns服務的相關腳本。
  8. The task is to implement the security information subsystems of security health care system. besides, basing on " the implement of corba technology in depth network security system ", we partly implemented the function of attacking and defending subsystems

    本課題完成了安全保健體系中的安全信息子系統,並在《 corba技術在路安全深度體系中的應用》的成果基礎上實現了攻擊及護子系統的功能。
  9. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對路安全的現狀,分析了邊界火墻及現有主機火墻的不足之處;對現有黑客的路攻擊手段與方法進行分析研究,並對這些攻擊的方法進行了研究;對企業路安全策略進行討論,分析了現有主機火墻在企業中應用的不足,並在此基礎上,結合包過濾、虛擬專用、入侵檢測等火墻技術,設計了一種企業中的主機火墻模型,並對這一模型進行了較深入地研究。
  10. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動技術,彌補了傳統的以火墻為基礎的被動的路安全機制的不足,成為當前路攻擊的主要手段。
  11. 3. a design of area cruise missile defense system is given based on combinatorial reconnaissance and multiplayer interception in order to achieve the vigorous defense aim. in this system, the image data collected by sensors used in warn

    3 .為了實現積極的戰略目的,在提出組偵察與跟蹤和多層攔截策略的基礎上,給出了一個適應當前要求的區域巡航導彈體系設計方案,對其硬體系統的功能進行了描述。
  12. Entering the information era, dynamic defense in network environment is trending up gradually ; meanwhile secure protection is now turning into depth and dynamic defense from static defense

    步入信息時代,路對抗環境中的動態趨勢逐步加強,安全護經歷了從靜態保護到縱深和動態的發展。
  13. The defense - in - dynamic & depth cissa model and the cooperative communication platform which are put forward in this paper have been applied into " the network intrusion detection, the warning and the security management technology " ( 863 program ), which lays the foundations for the successful examination of 863 experts

    本文所提出的動態縱深安全體系模型以及協同通信平臺,已經在「路入侵檢測、預警和安全管理技術(戰略預警) 」 ( 「十五」 863計劃)中得到了應用,為863項目順利通過驗收打下了堅實的基礎。
  14. In order to protect network system proactively, how to make the network security defense system dynamic and change the measure actively but not passively are the task of network security research

    如何使路安全的體系由靜態轉為動態,措施從被動轉變為主動,改變傳統總是處于被動挨打的處境。積極有效地保護路系統的安全是需要研究的新課題。
  15. In large - scale security system, subdomain segmentation can effectively improve the granularities of control and observation. by setting border protection in each subdomain, special custom protection is achieved. subdomain auto - isolation, global policy management, subdomain cooperation protection, can make the defense system more controllable, self - adaptive

    通過子域邊界保護以解決子安全需求不同,以及內部保護的針對性問題;利用子隔離、全局策略、子域協作等方式有效地解決不同控制域之間的協作問題,為大規模路系統提供靈活的反擊機制。
  16. In the research counterplan of hacker ' s attack, i carefully analyse the whole process of attack, so i study out the countermeasure

    在研究黑客攻擊的安全性問題時,以一個黑客攻擊監控路的全過程仔細分析研究了黑客攻擊手段,這樣就研究出具有針對性的對策。
  17. Yin - shang dynasty carried out the principle for choice of defense system by putting the city in the center and constructed the defense protective screen around the city through setting up many layers of defense installations ; and set up several circles of important military towns on the periphery ranges, where set up military pre - alarm and information transmitting systems fitted with main - way nets and post systems extending to all directions, so as to form the state military defense systems

    摘要殷商國家施行「都城居中」的選址原則,通過建造都城的多重設施,構建都城周邊的軍事屏障,並在周邊地區分設若干軍事重鎮環帶,建立周邊地區的軍事預警和信息傳遞系統,配之以四通八達的幹道和驛站制度,從而形成國家軍事體系。
  18. Intrusion detection, one of the most kernel technologies in dynamic security systems ( p2drr ), plays a very important role in the deep defense hierarchy system of network, which is the key of the conversion from static defense to dynamic defense, and as well a powerful tool of forcibly implementing the security policy

    入侵檢測技術作為動態安全系統( p2drr )最核心的技術之一,在路縱深體系中起著極為重要的作用,它是靜態護轉化為動態護的關鍵,也是強制執行安全策略的有力工具。
  19. Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users

    它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種措施來削弱和消除攻擊流量對路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。
  20. The immune system is often described as a kind of military unit, a defense network that guards the body from invaders

    免疫系統經常被描繪成象軍隊,一個防禦網路能夠保護機體免於被入侵。
分享友人