防禦網 的英文怎麼說
中文拼音 [fángyùwǎng]
防禦網
英文
protection net-
The research of network intruded crypt model p2mdr
2網路安全防禦模型的研究The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area
由信息產業部支持的研究課題「網路集成防禦系統」 ,通過對網路中各節點主機的防火墻進行管理,在實現多機聯合防禦領域進行了探索研究。We ' re past the firewalls, local defense nets, minutemen, subs
我們通過了防火墻、局部防禦和支網Updates to the site are made every five minutes and the so - called " norad tracks santa " program has german, spanish, french, italian, japanese and english links
網站每5分鐘更新一次,這個所謂的「北美太空防禦司令部追蹤聖誕老人」節目具有德語、西班牙語、法語、義大利語、日語以及英語6種版本的鏈接。In the age of information, security system does not mean a simple pure protection, but the great rivalship between the security officers ( so ) and virtual attackers ( va ). some cyberspace security systems only give the defense framework, which is the integration of different protection technologies based on the system security management requirements, but not based on the understanding of information rivalry
在信息技術高速發展的時代,網路安全已不再是單純的防禦技術,而越來越成為安全管理員( securityofficers , so )與虛擬攻擊者( virtualattackers , va )之間信息與知識的對抗。For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take
為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )
文中針對單系統、堡壘防火墻屏蔽子網、帶dmz (非軍事化區)防禦帶三種不同網路拓撲結構加以說明,闡述nat (網路地址轉換)的原理和dmz工作原理以及它們的相應網路拓撲結構。同時給出基於dns服務的相關腳本。The task is to implement the security information subsystems of security health care system. besides, basing on " the implement of corba technology in depth network security system ", we partly implemented the function of attacking and defending subsystems
本課題完成了安全保健體系中的安全信息子系統,並在《 corba技術在網路安全深度防禦體系中的應用》的成果基礎上實現了攻擊及防護子系統的功能。In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply
本文針對網路安全的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack
入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。3. a design of area cruise missile defense system is given based on combinatorial reconnaissance and multiplayer interception in order to achieve the vigorous defense aim. in this system, the image data collected by sensors used in warn
3 .為了實現積極防禦的戰略目的,在提出組網偵察與跟蹤和多層攔截策略的基礎上,給出了一個適應當前要求的區域巡航導彈防禦體系設計方案,對其硬體系統的功能進行了描述。Entering the information era, dynamic defense in network environment is trending up gradually ; meanwhile secure protection is now turning into depth and dynamic defense from static defense
步入信息時代,網路對抗環境中的動態防禦趨勢逐步加強,安全防護經歷了從靜態保護到縱深防禦和動態防禦的發展。The defense - in - dynamic & depth cissa model and the cooperative communication platform which are put forward in this paper have been applied into " the network intrusion detection, the warning and the security management technology " ( 863 program ), which lays the foundations for the successful examination of 863 experts
本文所提出的動態縱深防禦安全體系模型以及協同通信平臺,已經在「網路入侵檢測、預警和安全管理技術(戰略預警) 」 ( 「十五」 863計劃)中得到了應用,為863項目順利通過驗收打下了堅實的基礎。In order to protect network system proactively, how to make the network security defense system dynamic and change the measure actively but not passively are the task of network security research
如何使網路安全的防禦體系由靜態轉為動態,防禦措施從被動轉變為主動,改變傳統防禦總是處于被動挨打的處境。積極有效地保護網路系統的安全是需要研究的新課題。In large - scale security system, subdomain segmentation can effectively improve the granularities of control and observation. by setting border protection in each subdomain, special custom protection is achieved. subdomain auto - isolation, global policy management, subdomain cooperation protection, can make the defense system more controllable, self - adaptive
通過子域邊界保護以解決子網安全需求不同,以及內部保護的針對性問題;利用子網隔離、全局策略、子域協作等方式有效地解決不同控制域之間的協作問題,為大規模網路系統防禦提供靈活的反擊機制。In the research counterplan of hacker ' s attack, i carefully analyse the whole process of attack, so i study out the countermeasure
在研究黑客攻擊的安全性問題時,以一個黑客攻擊監控網路的全過程仔細分析研究了黑客攻擊手段,這樣就研究出具有針對性的防禦對策。Yin - shang dynasty carried out the principle for choice of defense system by putting the city in the center and constructed the defense protective screen around the city through setting up many layers of defense installations ; and set up several circles of important military towns on the periphery ranges, where set up military pre - alarm and information transmitting systems fitted with main - way nets and post systems extending to all directions, so as to form the state military defense systems
摘要殷商國家施行「都城居中」的選址原則,通過建造都城的多重防禦設施,構建都城周邊的軍事防禦屏障,並在周邊地區分設若干軍事重鎮環帶,建立周邊地區的軍事預警和信息傳遞系統,配之以四通八達的幹道網和驛站制度,從而形成國家軍事防禦體系。Intrusion detection, one of the most kernel technologies in dynamic security systems ( p2drr ), plays a very important role in the deep defense hierarchy system of network, which is the key of the conversion from static defense to dynamic defense, and as well a powerful tool of forcibly implementing the security policy
入侵檢測技術作為動態安全系統( p2drr )最核心的技術之一,在網路縱深防禦體系中起著極為重要的作用,它是靜態防護轉化為動態防護的關鍵,也是強制執行安全策略的有力工具。Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users
它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種防禦措施來削弱和消除攻擊流量對網路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。The immune system is often described as a kind of military unit, a defense network that guards the body from invaders
免疫系統經常被描繪成象軍隊,一個防禦網路能夠保護機體免於被入侵。分享友人