重放攻擊 的英文怎麼說

中文拼音 [zhòngfànggōng]
重放攻擊 英文
reassembly attack
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : releaseset freelet go
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 重放 : 1. (安放) reset2. (放映; 放音) replay
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的,所以網上信息的安全和保密是一個至關要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  2. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    節點可以通過節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量監聽到的綁定消息進行拒絕服務
  3. A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm, which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

    該方案克服了通常的質詢響應認證方案的弱點,可以用在網路環境下,實現通信雙方的相互認證,防止重放攻擊和冒充,實現簡單,執行效率高。
  4. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開性,來自外部的增多,如dos / ddos;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  5. He comes against aiath ; he passes through migron ; at michmash he deposits his gear

    28亞述來亞葉,經過米磯侖,在密抹安
  6. The air bombardment of german fortifications was crucial, even if not as effective as hoped, and the naval attack on german defenses was essential, even if it did not silence most of the german guns, but at h - hour when the landing craft lowered their ramps the success or failure of the greatest amphibious attack in the history of warfare, the event upon which the success of the allied effort in world war ii depended, all came down to the bedford boys and thousands of men like them scrambling in chest high water, weighed down with equipment and ammunition, and the water they splashed into was crimson with their blood and that of their buddies

    德國防禦工事的炮火是殘酷無情的,即使它沒有達到預期的效果;對德國防禦的海上是至關要的,即使它並不能平息德國人多數的炮火;但是,當開始時刻,登陸艇漸漸下它們的滑梯的時候,戰爭史上最偉大的兩棲作戰? ?一場決定二戰的聯盟力量的勝利的戰爭? ?的勝敗就掌握在了貝德福德的男孩們以及數以千計的像他們一樣在齊胸的水裡前行的戰士們手裡,他們背負著沉的裝備和武器,跳進他們和他們兄弟的鮮血染紅的海水裡。
  7. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文密碼驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。
  8. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  9. Both these two mechanisms can prevent the attack of re - send

    Esp和ah機制都能為通信提供抗重放攻擊
  10. Furthermore, we analyze its efficiency and its ability to resist replay attacks

    然後分析了該協議抵抗重放攻擊的能力和運行效率。
  11. Resource policy can be set, up flexible on the basis of code base in this method

    該方案資源權限配置靈活,並且可防止移動代理重放攻擊
  12. And besides, the whole system ca n ' t resist all the possible attacks, especially replay attack

    而且整個系統沒有充分考慮所有可能的,尤其是重放攻擊
  13. Also mobile ip technique brings potential secure problems, one of which is registration suffering denial of service attacks and replay attacks

    另外,移動ip也帶來了潛在的安全問題,其中注冊過程可能遭受拒絕服務重放攻擊
  14. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp協議來以下的安全服務:訪問控制,無連接完整性,數據源認證,重放攻擊保護,機密性和有限的通信流保密性。
  15. Srtp uses efficient aes algorithm to guarantee confidentiality of rtp payload, and uses hmac - sha1 algorithm to provide data integrity as well as to prevent hostile replay hacking

    Srtp協議採用高效的aes演算法來保證rtp載荷的機密性,並使用hmac - sha1演算法提供數據的完整性保護,同時能夠防止惡意的重放攻擊
  16. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  17. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    本文主要做了以下幾個方面的工作: ( 1 )對一次性口令認證技術進行了深入的分析和探討,針對現存一次性口令認證系統不能抵禦小數的安全漏洞,提出一種改進的一次性口令認證機制,這種認證機制能夠有效地抵禦小數重放攻擊,而且使用時不需要客戶端做任何設置和安裝任何軟體。
  18. Attacking siege ai concentrates on taking the settlement rather than chasing down units outside the settlement

    中的圍城部隊會把在奪取城市,而非追在城外的單位。
  19. One of the most significant aspects is that the combination of strict type checks, array bounds checking, and automatic garbage collection thoroughly blocks the most destructive forms of server code vulnerabilities : buffer overruns, double - release errors, and rogue pointers

    最顯著的方面之一是嚴格的類型檢查、數組邊界檢查和自動垃圾收集的組合徹底防止了最具破壞性形式的服務器代碼:緩沖區溢出、復釋的錯誤和游離的指針。
  20. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗保護,以及對網路通信中的通信流分析提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
分享友人