查询词典 Traceback
- 与 Traceback 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A packet marking scheme to traceback the source of distributed denial of service based on Chinese remainder theorem was proposed.
提出了一种基于中国余数定理的包标记方案,对分布式拒绝服务攻击的来源进行追踪。
-
Intrusion traceback is an important technology in network security aspect,,which is aiming at tracing the real source of attacking, providing precise information for alarm and supplying reliable proof for post-crime testification and improving network system's security.
入侵跟踪是计算机网络安全领域的一个重要技术,其目的是跟踪攻击的真正来源,为报警提供精确的信息,以及事后的犯罪举证和修补网络系统安全漏洞提供可靠依据。
-
In this article Jini was applied in the traceback system.
这就正是本文所要解决的问题。
-
The third item, a traceback object, is new.
第三项,是一个新增的追踪对象。
-
The emphasis of this dissertation is the detection algorithm and traceback algorithm.
在此基础上,提出了基于流量的SYN Flooding攻击检测、定位及防御体系结构。
-
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
-
The improvement of effectiveness ,active respondent ability and IP traceback ability are analyzed and practiced in this paper.
本文主要对提高入侵检测系统的有效性、对网络攻击事件的主动反应能力以及攻击源追踪能力进行了分析和实践。
-
Analyse the characteristics of several traceback schemes; propose the problem that should be resolved.
分析几种跟踪技术的特点,提出了需要解决的问题。
-
If a handler is provided for an exception, this handler is given access to the traceback object.
如果一个异常有自己的处理程序,处理程序就可以访问这个traceback对象。
-
In the thesis, research on network vulnerability analysis and IP traceback is discussed.Under the background of "IP network topology and analysis of performance based on network detection" supported by NSFC, Distributed Network Measurement and Analysis Infrastructure, the cooperant result of our workgroup, is discussed, and also the significance of network vulnerability analysis and IP traceback research in DNMAI; Several existing advanced vulnerability analysis methods and models are compared and summarized. Advantages and disadvantages of each technique are discussed in detail.
论文以国家自然科学基金重点项目(基于网络探测的IP网络拓扑发现和性能分析)工作组提出的分布式网络测量和分析基础架构为背景,在网络脆弱性分析和反向追踪方面做了一些研究工作:说明了脆弱性分析和反向追踪研究在DNMAI架构中的意义和作用;对现有网络脆弱性分析领域的几种先进模型和技术进行分析、比较和综述,详细讨论了各种技术的优缺点。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。