棧掃描 的英文怎麼說
中文拼音 [zhànsǎomiáo]
棧掃描
英文
stack scan-
Employing idef to establish framework, dynamitic and functional models, the system also designs a non - back shifting search arithmetic for double - scanning buffer zone and a double - track structure for searching process. according to the characteristics of e - mail control and electronic documentary mining technology, bayes classifiers are made to strengthen the electronic control system in which electronic documentary mining technology is used ; and moreover the double systematic structure of c / s & b / s is constructor with the presence of some function relationships in mining process as well as systematic mining and program handling
系統採用i _ 2def方法建立了結構模型、動態模型和功能模型;設計了雙掃描緩沖區的無回溯搜索演算法及搜索過程的雙棧結構;根據電子郵件監控系統和電子文檔挖掘技術的特徵,設計了bayes分類器並使用了增強型方法,提出了一種運用電子文檔挖掘技術的電子郵件監控系統;構建了c / s和b / s雙重體系結構;並給出了挖掘過程的部分函數調用關系及系統挖掘的處理過程、部分處理程序。The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse
文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議棧指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed
設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人