attack inspection 中文意思是什麼

attack inspection 解釋
入侵檢測
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  • inspection : n. 1. 檢查,檢驗;審查。2. 檢閱,視察;參觀。
  1. In detail analyzing linux stateful inspection firewall source code, the new defending dos attack method has been

    3 .對常見的幾種防synflood的dos攻擊模型進行了對比分析,改進了一種新的防dos攻擊的模型。
  2. In this paper, the basic research of stateful inspection firewall has been made, enumerating the basic principle and method of dos attack

    2 .對常見dos攻擊的原理和方法進行了討論,給出了一些常見的防dos攻擊的防禦方法。
  3. The stateful inspection firewall is a milestone, it checkes data packet by connecting previous data packet. it is possible to prevent dos attack using stateful inspection firewall

    本文的主要內容有: 1 .在介紹狀態檢測防火墻基本概念的基礎上,詳細的分析了linux防火墻netfilter的狀態檢測部分的源代碼程序。
  4. Stateful inspection firewall is a milestone of the development of firewall. it makes impossible to prevent from dos attack by checking data packet indepentantly. the packet filter firewall hardly meets the need of network defence

    狀態檢測防火墻作為防火墻發展中的一個里程碑,由於它對數據包的檢測與先前的數據包相關聯,使其對dos攻擊的防禦成為可能。
  5. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  6. The scramble times of original image is optional, after the scramble process, the watermark image is scattered into the whole spatial space of original image ; it enlarged the difficulty of extraction and inspection, and enhanced the anti - attack and security

    原始圖像置亂的次數是可調的參數,通過置亂過程,使水印均勻分散到原始圖像的整個空間里,這樣加大了水印提取和檢測的難度,增強了水印的抗攻擊性,魯棒性和保密性。
分享友人