埠掃描攻擊 的英文怎麼說

中文拼音 [sǎomiáogōng]
埠掃描攻擊 英文
port scan attack
  • : 名詞1. (碼頭) pier; port; wharf; jetty 2. (有碼頭的城鎮) port city3. (商埠) commercial port
  • : 掃構詞成分。
  • : 動詞1. (照底樣畫) copy; depict; trace 2. (在原來顏色淡或需改正之處重復塗抹) retouch; touch up
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. In this section, i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host

    在本節中,我將討論者所使用的一種形式,它不會被目標主機輕易地偵測到。
  2. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  3. In misuse mode, modules such as port - scanning, sniffer, and ip spoofing have been implemented

    在誤用模式中系統設計了dos、 spoofing、網路欺騙、嗅探檢測、模塊。
  4. Finally, the thesis analyzes address scan, port scan, operate system identify etc. to find what protocol to be used by the attacker in the information collections stage, and designs some program to deceive the attacker. also, in this section the style of honeypot, and the security of honeypot, including two designs about how to abduct the intrusion to the honeypot, the nat ( network address translation ) technique and the proxy technique will be discussed

    在第三部分,分析地址、操作系統識別等信息收集階段的的原理和所利用的協議,以及所採用的手段,詳細的論述對地址的欺騙、對埠掃描攻擊的欺騙、對操作系統識別對欺騙的設計與實現。
分享友人