英语人>网络例句>intrusion 相关的网络例句
intrusion相关的网络例句

查询词典 intrusion

与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]

The severe seawater intrusion exists in certain eel farming factories within Changle, Fuzhou, in certain prawn farm within Jiuzhen county, Zhangzhou, and in certain saltern within Xiuyu district, Putian, all belonging to seawater intrusion in human activity areas. The maximum concentration of Cl and mineralization within those severe intrusion areas are 5629.00 mg/L and 33.16 g/L respectively. The slight seawater intrusion is monitored in Quangang district, Quanzhou, where natural conditions are kept. No seawater intrusion is monitored in Dongchong peninsula, Ningde. No soil salinization is monitored except Zhangzhou where the sand is slightly salinized.

在福州长乐市近岸某鳗鱼养殖片区、漳州漳浦县近岸某对虾养殖片区、莆田市秀屿区某盐田附近监测到严重海水入侵,均属人类开发活动影响区域内的海水入侵,严重入侵区域氯度最高达5629.00 mg/L,矿化度最高达33.16 g/L;在泉州市泉港区某自然村监测到轻度入侵,属自然状态下的海水入侵;在宁德东冲半岛外浒沙滩附近未监测到海水入侵;在漳州断面监测到土壤盐渍化,为轻度盐渍化土,其他断面为非土壤盐渍化土。

Lithologies are mostly sand and carbonate rocks, caps are mud rock, shale and magmatite. Entrap types are anticline, fault block rebuilt by breaking and the screened entrap diapered rock mass. The composition is CO_2, N_2, CH_4, C_2H_6 and He etc. It is magma air source body and its geologic fashions are intrusion and buried volcanic conduit. The relations between gas reservoirs and gas source bodies have three types: magma intrusion-breaking-communicated gas reservoir, magma intrusion-contacted CO_2 reservoir and buried volcanic conduit-contacted gas reservoir. The CO_2 migration in magma intrusion is consisted of fusing and crystallizing phases;it in volcanic conduit is consisted of near-surface effusion and crystallizing phases.The buoyancy of CO_2 in water far more than migration resistance in breaking or chink, CO_2 is easy float upward, the floating can results in differentiation of different density gases and concentration of sealed gas. The gas in sand reservoir firstly migrate into the higher porosity and coefficient of permeability sand, and along with the pressure going up it migrate into the lower. In magma intrusion-breaking-reservoir migration, CO_2 firstly migrate into watered breaking, began gravity differentiation and concentrate, the gas pressure time and again go up, CO_2 migrate into reservoir and concentrate under expansibility as the pressure reach upward a given extend. The CO_2 in reservoir experience four breaking modes: chemistry deposition, dissolution, diffusion and mechanic breaking, the pressure balance can be broken by faulting and the CO_2 will further migrate and form new reservoir.

济阳坳陷已发现的八里泊、阳25、平方王、平南、高青、花17 CO_2气藏主要储集层位有奥陶系、中生界、沙四段、沙三段、沙一段、馆陶组和明化镇组,储集层岩性以砂岩和碳酸盐岩为主,盖层以泥质岩、页岩和岩浆岩为主。;圈闭类型主要为受断裂改造的背斜、断块及刺穿岩体遮挡圈闭。;气体成分主要有CO_2、N_2、CH_4、C_2H_6、He等。;主要气源体为岩浆气源体,气源体的主要地质形式为侵入体和埋藏的火山通道。;气藏和气源体的空间关系有岩浆侵入体一断裂一气藏沟通型、岩浆侵入体-CO_2气储集层接触型和埋藏火山通道-气储集层接触型三种类型。;岩浆侵入体CO_2气运移分为熔融运移阶段和结晶运移阶段,火山通道中CO_2气运移分成近地表喷发阶段和结晶运移阶段。;断裂中,CO_2在水中的浮力远大于运移阻力,CO_2气容易上浮,CO_2在断裂中的易浮性导致不同密度气体的分异和走向上封闭的断裂气体相对富集。;气体在砂岩储集层运移聚集具有选择性,会优先进入孔隙度和渗透率较高的砂岩,随着压力增加,才会进入孔隙度和渗透率较低的砂岩;在岩浆气源体-断裂-储集层空间输导格架下,CO_2气在膨胀力的驱动下,首先进入含水的断裂并重力分异而聚集,气体压力会不断增高,当压力增至一定程度,CO_2气会向高孔隙度、渗透率的储集层运移并聚集。;在岩浆气源体-储集层接触空间输导格架下,CO_2气受膨胀力的驱动直接向储集层运移并聚集。;成藏的CO_2气会经历化学沉淀、溶解、扩散和机械破坏四种破坏方式,会受断裂切割而打破压力平衡,沿断裂进一步运移和聚集成藏。

Intrusion detection analysis technology is the core of intrusion detection system which includes abnormity intrusion detection and abused intrusion detection.

入侵检测分析技术是入侵检测系统的核心,主要可分为异常入侵检测和误用入侵检测。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Among the diversity of security technologies, intrusion detection technology is one of the focuses. This thesis at first elicits the situation of nowadays intrusion detection technology and Intrusion Detection System after explaining the basic concept of intrusion detection. Then on the basis of analyzing some representative IDSs the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity, flexibility, interoperability etc. Therefore new technologies are needed for explored to improve the overall performance of IDS.

入侵检测系统是目前网络安全领域的一个研究热点,本文首先从入侵检测的基本概念出发,阐述了入侵检测技术以及入侵检测系统的发展现状,通过分析当前一些有代表性的入侵检测系统指出了入侵检测系统存在的一些不足,在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。

However, the difference between Hongge and Xinjie is also apparent, perhaps reflecting the source difference in the mantle. Relative to the Hongge intrusion the Xinjie intrusion is more depleted in Nd isotope ratio and enriched in REE and LILE. The Xinjie intrusion plots in the first quadrant in Sr-Nd diagram, which shows the Sr isotope-enriched and Nd isotope-depleted slightly feature. This indicates that the source of the Xinjie intrusion may had the mantle wedge signature.

但红格、新街岩体的源区又有所不同,新街岩体较红格岩体Nd同位素更亏损,稀土和大离子亲石元素更富集;新街岩体在Sr-Nd相关图上,位于第一象限,显示Sr同位素富集,Nd同位素略亏损特征,指示了新街岩体的源区可能有残留地幔楔的成分。

Although the unique independence, mobility of Mobile Agent can improve the haleness, tolerableness, adaptability and expansi- bility of the intrusion detection system, which induce Mobile Agent has used for intrusion detection system, it is necessary to improve on the intrusion detection system which base on Mobile Agent for questions faced the intrusion detection system.

虽然移动Agent独特的自主性和移动性可以提高入侵检测系统的健壮性和容错性,增强适应性和可扩展性,使得移动Agent技术目前已经用于入侵检测系统,但是考虑目前入侵检测所面临的问题,有必要对基于移动Agent的入侵检测系统改进。

In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.

本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。

The essence of EDID is to set up a normal behavior fuzzy sub collection A on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection B with real time transfer array, then detect with the principle of minimum distance in fuzzy discernmethodThe innovation point of this paper is : Put forward the method of EDID, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of IDS; Use tree type structure to preservation the character database, have saved greatly stock space; in detection invade , carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method.

本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于Euclidean距离的入侵检测方法EDID,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。

Based on the Common Intrusion Prevention Framework and the NetworkBased Intrusion Prevention System standards, we present an intrusion prevention system called Gigabits IPS, which is used to improve the prevention speed and accuracy, and to ensure highspeed network monitoring. The GIPS consists of the data capture module, the event generation engine, the policy script interpreter and the intrusion prevention module.

文着眼于提高入侵防御系统[1]的检测速度和精准度[2],遵循通用入侵检测框架[3]规范,依据基于网络的入侵检测系统的结构要求,依据层次化结构设计的思想,自底向上依次分为数据采集模块、事件生成引擎、策略脚本解释器和入侵防御模块四个部分。

第1/45页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Heat Rising
Grand Illusion
Status Seeker
X-Revolution (Settling For Second Best)
I Let The Music Speak
Ride To Agadir
Ghosts
Intrusion / Confusion
You Owe Me One
Troubled Waters
推荐网络例句

The shaping method of noncircular part and the tool holder's radial motion characters in noncircular turning process are discussed in detail in the thesis.

论文详细研究了非圆零件的成型方法和加工过程中刀架的径向运动规律。

I have not really liked him,I do not like his this kind of disposition.

我没有真的喜欢他,我不喜欢他的这种性格。

As we know the price of traditional product is composed of the cost and the profit of the company involving market competition, monopolizes and many other factors.

我们知道作为传统的商品,定价的模式往往是在成本的基础上增加厂商的预计利润而形成其价格,当然也要考虑到市场竞争、垄断等其他方面的因素。