false attack 中文意思是什麼

false attack 解釋
【軍事】佯攻。

  • false : adj (opp true)1 虛偽的,虛假的,捏造的;撒謊的,不誠實的;錯誤的。2 不正的,非法的。3 假造的;...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  2. Next, this paper introduces four kinds of hidden information security trouble existed in network media by detailed cases, which is, false and harmful information spreading ; consequent taking place of network leakage of confidential information ; the overflow of computer virus ; and hacker attack and network information campaigns

    網路媒體作為一個新生事物,針對網路媒體的法律法規的相對滯后,大眾對網路媒體概念也相對模糊混亂,這也使網路媒體面臨的安全問題得不到足夠的重視,缺乏相應的解決方法。
  3. Ids has been fast developing since it ' s put forward. but intrusion detection technology is now wandering with the universal application of high - speed network, the appear of new attack methods like distributed denial of service attack, and the low efficiency and high false positive of today ' s idss

    但是,由於高速網路和交換式網路的普遍應用,以分散式拒絕服務攻擊為代表的新型攻擊方式的出現和發展,以及現有入侵檢測系統效率低下、誤報率和漏報率較高的問題無法得到有效解決等問題,目前入侵檢測技術正處于發展的關鍵時期。
  4. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  5. Once an attack is activated, everything from account hijacking, changing of user settings, cookie theft and poisoning, or false advertising is possible

    一旦激活了攻擊,就可能發生從截獲帳戶、更改用戶設置、竊取和篡改cookie到虛假廣告在內的任何事情。
分享友人