traffic flow security 中文意思是什麼

traffic flow security 解釋
通信流安全
  • traffic : n 1 交通,(人、車、船、飛機的)來往;交通量;運輸;運輸量;運輸業;旅客,貨物。2 交易,貿易 (in...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Because traffic flow greatly increases in recent years and the rank of actual driving load enhances, causing this bridge to be at the excess load the service condition, so in order to guarantee the bridge ' s transport security, the main body structure of the bridge should be reinforced

    摘要長沙市八一路跨線橋由於近年來交通流量大增,實際行車荷載等級提高,使得該橋處于超負荷的營運狀態,為了保證大橋營運安全,需要對此橋的主體結構進行加固,在選擇加固方案時對比了三種加固方法:鋼混凝土組合結構加固方法、混凝土結構擴大截面加固方法、粘鋼加固方法。
  2. On the other hand, by the statistical analysis of historical flow data, the system can model the network traffic flows, and forecast short - term network flows. after that the system can analyse the network traffic abnormity. by use of the netwok management system and network security facility, we can setup a security infrastructure to monitor flows in real time, predicts the future flows, alarm some abnormal flows, respond to the abnormity automatically and immediately

    論文通過定期採集網路關鍵設備,包括匯聚層和核心交換層的流量情況,處理后以結構化、層次型的方式保存起來,一方面提供了圖形化的用戶介面,將收集的各種歷史數據和實時數據在其中以圖形的方式直觀地顯示出來,另一方面通過對歷史流量數據的統計分析,從而對網路流量進行建模,短時間預測網路流量情況,實現對網路流量異常情況的觀察分析,利用有充分響應能力的網路管理系統和網路安全設備,構成響應和預警的綜合安全系統。
  3. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  4. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路攻擊、蠕蟲病毒、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有攻擊性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。
  5. Ipsec offers security services including connectionless integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality for ip and upper layer protocols

    Ipsec為ip及上層協議提供了無連接完整性、數據源身份認證、抗重播攻擊、數據內容的機密性和有限的通信流量機密性等安全服務。
  6. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  7. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  8. The paper analyzes in detail the hidden defect of public security and traffic police network structure and security ; to use the zero - copy technology to snatch all the network packages under the high ? speed network ; to use multi - protocol analysis and reduction technology to solve the bottleneck, the heavy flow of network information protocol analysis and reduction

    本文詳細分析公安交警網路結構和網路安全隱患;運用零拷貝技術解決高速網路下獲得所有的數據包問題;運用多協議分析與還原技術解決網路信息大流量協議分析還原這一瓶頸問題。
分享友人