honeypot 中文意思是什麼

honeypot 解釋
抱膝跳水
  1. A low - interaction honeypot like nepenthes is easy to install and requires minimal maintenance

    如豬籠草蜜罐這種低交互的蜜罐易於安裝並且只需要很少的維護量。
  2. My favourite honeypot for these purposes is known as nepenthes [ ref 6 ], named after a genus of pitcher plants [ ref 9 ]

    為了這些目的我最喜歡的蜜罐就叫做「豬籠草蜜罐」 ,這個名字是按「豬籠草」這種植物來命名的。
  3. In this paper we describe how a particular low - interaction honeypot, nepenthes [ ref 6 ], can be used to quickly alert an administrator to a network compromise

    我們在本文中描述了一個低交互蜜罐,即「豬籠草」蜜罐,它可以在網路危機時迅速向管理員發出警報。
  4. For example, an attacker may gain access to a honeypot within the honeynet, then disable data capture functionality on the honeypot

    舉例來說,一個攻擊者可能獲得蜜網內部一個蜜罐的訪問權,然後使其數據捕獲能力失效。
  5. Then, in chapter 2, it introduces the basic principle of honeypot and honeynet, and takes the gen honeynet gateway of the honeynet project for example to analyze the key technical of honeynet and visual honeynet, at last it introduces the principle of honeypot farms

    在第二章中首先介紹了蜜罐技術的基本原理,然後介紹了蜜網技術的基本要求並以蜜網項目組開發的第三代蜜網網關為例詳細分析了蜜網系統的關鍵技術及虛擬蜜網技術,最後介紹了蜜場的基本思想。
  6. For the dea you ain ' t nothing but a honeypot

    對dea來說,你只是他們的一塊誘餌罷了
  7. The research of initiative firewall based honeypot

    基於蜜罐技術的主動型防火墻的研究
  8. The requirement and outline design of the honeypot system

    蜜罐系統需求定義和概要設計。
  9. L. reserch in basic principle and infrastructure of honeypot

    網路誘騙原理和蜜罐體系結構研究。
  10. Allowing these to act as part of a honeypot configuration

    允許這些行動的一個組成部分蜜罐配置。
  11. The function test and performance test of the honeypot system

    對蜜罐系統進行了功能測試和性能測試。
  12. Design and implementation of honeypot system of automatic capture of worm

    蜜罐自動捕獲蠕蟲病毒的設計和實現
  13. In this article the infrastructure and implement of a honeypot system is discussed

    本文主要論述蜜罐系統結構原理及其實現。
  14. A honeypot is a service ( program or server ), which is installed in a network

    蜜罐是安裝在網路中的一個服務(程序或者服務器) 。
  15. Kfsensor, the windows honeypot server system, features a number of different types of emulation, both simple and complex

    窗戶蜜罐服務器系統,具有若干不同類型的競賽等方式,既簡單又復雜。
  16. The author sets up a diskless honeypot in chroot environment, and relates the system root directory to chroot directory with nfs, so in such a honeypot, the hackers " file access will be recorded by means of capturing network packets

    作者設置了一個更改根目錄( chroot )環境下的無盤蜜罐,利用nfs把系統根目錄與更改根目錄聯系起來,採集網路數據包就能記錄黑客在蜜罐內對文件的訪問活動。
  17. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  18. Information security defense mechanism is changed from passivity to initiative as the information times going, so honeypot technology is more and more regarded as an effective way to anti - attack

    信息時代的到來需要計算機安全防護由被動防禦轉為主動防禦,從而使蜜罐技術在網路對抗中日益受到重視。
  19. Moreover, introduces presen t technologies and methods on defending worm virus and junk mail based on honey technology. after accomplished 863 program ( integrated network security defensive system ), that the writer designs dynamic honey project. the introducing of coordination and interaction into design realizes the coordination control between distributive ids and ids, distributive firewall and firewall, distributive honeypot and honeypot

    結合863計劃- - -網路集成化防衛系統,設計了動態的honey方案,在設計中引入了協同和聯動的概念,使整個系統中分散式ids和ids ,分散式firewall和firewall ,分散式honeypot和honeypot之間實現了協同控制;同時基於主機的ids 、 honeypot 、 firewall之間實現了聯動。
  20. As well as recording items such as the start and end time of an attack, the visitor ' s ip and port addresses, all the data transfered both to and from the honeypot is recorded

    以及記錄的項目,如起始和結束時間的攻擊,該名旅客的ip和埠地址,所有的數據都轉移到從蜜罐記錄下來。
分享友人