蠕蟲的威脅 的英文怎麼說

中文拼音 [chóngdewēixié]
蠕蟲的威脅 英文
the threat of internet worms
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞(從腋下到腰上的部分) the upper part of the side of the human bodyⅡ動詞(脅迫) coerce; force
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. In recent years, the computer virus has made an tremendous damage to the companies in the world. in contrast, the investment is too little from enough

    但是,在網路越來越嚴重今天,隨著一輪又一輪大規模病毒瘋狂發作,企業老總們對企業安全防範紛紛加以重視。
  2. A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked

    高級包偵測引擎將能夠使asic快速偵測包有效載荷以便識別潛在安全,例如現在那些將通過防火墻而不能阻止病毒信息包。
  3. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路普及程度越來越高,由網路攻擊、病毒、惡意下載、設備異常等因素導致網路流量異常對網路性能影響越來越大,某些帶有攻擊性異常流量干擾了正常網路運行秩序,對網路安全造成了嚴重。在這種情況下,如何及時而準確檢測出網路流量異常,保證網路正常運行,為用戶提供一個良好網路環境成為一個備受關注研究課題。
  4. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、病毒和網路濫用行為特點,基於大多數網路流異常必然反映在網路網路流量數據特徵變化以及網路設備運行狀態改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態異常評估方法,確定了5種評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中權重。
分享友人