network attack 中文意思是什麼

network attack 解釋
網路攻擊
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Application of network cybernetics in network attack and defense

    網路控制論在網路攻防中的應用
  2. Formulization of network attack pattern based on improved attack tree

    基於改進攻擊樹的網路攻擊模式形式化研究
  3. So network attack technology is of great importance to nation security. to perform a successful network attack, an attacker should firstly gather vulnerability information of the target networks

    為了在未來的網路戰中掌握主動權,網路攻擊技術是不可或缺的武器,研究和發展網路攻擊技術對于國家安全具有重要的軍事戰略意義。
  4. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。
  5. On the one hand, the combination of information techenology with governmant management, finance, public service, education, medical treatment, traditional business brings a big new market ; on the other hand, although the computerization brings high efficiency and friendly service, it also brings the threat, risk and duty. the information on web is often to be wiretapped, to be tampered or to be destroyed. all kinds of network attack programs are to be diffused

    一方面,信息技術與政府管理、金融、公共服務、教育、醫療和傳統商務的結合帶來了一個巨大的新市場;另一方面,信息化在帶來高效率和友好服務的同時,也帶來了威脅、風險和責任,網上信息被竊、被篡改、被破壞的事件時有發生,各種網路攻擊程序的廣泛傳播更使人們憂心忡忡。
  6. Network security has become government 、 research 、 and company focus. the upgrading network attack meanings cause much destroyes and make much more loss

    網路攻擊手段的不斷升級,其破壞性也越來越大,造成的損失也就越來越多。
  7. Among the network attack meanings, denial of service ( dos ) is one of important network attack, it mainly uses the bug of network protocol

    在這些網路攻擊中,拒絕服務( denialofservice , dos )攻擊作為一種重要的網路攻擊手段,該攻擊主要利用了網路協議的缺陷。
  8. With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security

    隨著網路攻擊手段的日益復雜化、多樣化和自動化,傳統的入侵檢測系統( ids )已不能滿足安全需求。
  9. In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed

    為了在分散式網路追蹤系統中協調監控代理,及時共享多點採集的追蹤數據合作定位網路攻擊源,提出一種基於協同機制的攻擊源追蹤方法。
  10. Theoretical source of transparent model " s advantages is discussed, and then solutions of its key technology, last a programming realization - setting network card promsic to receive packets, keeping mac address, and checking packets base mac frame to realize transparent model in ip protocol rebuilding. the key technologies of firewall are packet filter and application proxy both of which can " t keep in step with network attack development

    鑒於此,本文從透明模式防火墻的特徵和功能出發,探討了其本質、技術實現要點及可行性方案,給出有別于上述兩方案的實現:網卡置於混雜模式,保留mac地址, ip重組、檢查、轉發過程一氣呵成,將透明模式的實現融合在ip重建中,使得整個防火墻體系結構更加緊湊,提高了效率。
  11. Finally summarizing above achievement, proposes the automatic network attack decision making and response system

    最後總結以上研究成果提出了網路攻擊自動響應和決策系統。
  12. This thesis first presents an access level taxonomy and several other taxonomies based on the analyses of previous work, and their taxonomic characteristics used to define a network attack are limited in scope to those features that are observable and measurable at the victim of the attack

    本文首先在總結前人研究成果和不足的基礎上提出了訪問權限分類法和其他幾種分類法,它們的分類特徵限定為攻擊受害者可以發現和探測的,隨后運用rdf模型將這些分類法邏輯組合成為基於受害者的網路攻擊描述體系。
  13. In order to enhance the teaching effect, we have developed the network firewall, the data encryption and the email encryption system, the network monitor and control system. the students not only may operate and configure these systems actually, also carry on the network attack and defense, and obtain the experience, grasp the information security elementary knowledge, the elementary operation and the basic config method

    為提高教學效果,開發了與信息安全實驗相關的網路攻擊、網路防火墻、數據加密及電子郵件加密、網路監控等子系統,不但可以由學生實際操作、配置進行網路攻防,使學生可以在此虛擬實驗環境中獲得相關的知識和實際動手操作的經驗,掌握信息安全基礎知識、基本操作、基本配置。
  14. Nvs is based on trojan horse architecture and facing to network attack

    Nvs採用木馬體系結構的客戶服務器模式,包含執行端和控制端兩部分。
  15. Sixthly, one cluster - based intrusion prevention system ( briefly named cbips ) is presented. the experimentation prototype of the cbips shows that it can improve the performance of network attack prevention by using multi - computer for parallel process

    提出了一個基於機群網路入侵阻斷系統( cluste卜basedintrusionpreventionsystem ) ,簡稱cbips . cbips實驗原型系統表明, cbaps利用多臺計算機并行工作,提高網路攻擊阻斷性能。
  16. ( 2 ) do an in - depth research on network attack technology based trojan horse

    ( 2 )深入研究了基於木馬的網路攻擊技術。
  17. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。
  18. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  19. Cyber war methods include computer network attack, transmitting computer viruses and other destructive hacking

    網戰戰法包括,攻擊電腦網路系統,發送電腦病毒以及其它破壞性黑客行為
  20. The thesis analyzes concerned hidden trouble of network security, common used method of network attack, the system structure of information system, hierarchy of network security, security evaluation rule of information system, and analyzes the problem of e - business which shall be solved

    本文分析了網路本身存在的安全隱患,常見的網路攻擊方法,信息系統的安全體系結構,網路安全的層次模型,信息系統的安全評估準則,在此基礎上分析了電子商務要解決的難題。
分享友人