攻击的
- 与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
If attack is aimed at IP, want you to be on lead plane of a physics only, what atttack without giving thought to is you which IP, bear so actually those who atttack discharge is same a net card, handling those who atttack a request is same a CPU, same a memory, to fictitious lead plane, the resource of physical lead plane can be eroded certainly, how the likelihood is insusceptible.
攻击如果是针对IP的,只要你在一台物理主机上,不管攻击的是你哪个IP,那么实际承受攻击流量的是同一个网卡,处理攻击请求的是同一个CPU,同一条内存,对于虚拟主机来说,物理主机的资源一定会遭到侵蚀,怎么可能不受影响呢。
-
But this kind of invasion cannot avoid the detection of IDS using the protocol analysis technology.(2) In the invasion activities of hackers using TCP, the actions about scanning and Denial of Service utilizing the three-handshake protocol are general. The characteristics of the actions are dynamic for its lie on a series of packets from beginning to end. So the IDS using the traditional pattern match technology cannot detect these actions effectively, but the IDS using the protocol analysis technology can do its.
2在利用TCP协议进行的黑客活动中,比较常用的是利用三次握手过程进行扫描行为和拒绝服务攻击,这类攻击的特征必须根据前后的一系列数据包才能确定,因此攻击特征具有动态性,很不适合于采用模式匹配作为信息检测技术的IDS,但协议分析技术可较为迅速地检测出这类攻击。
-
It gains better performance on periodical attacks over non-periodical attacks. IEEW is more suitable to DoS attacks. By constructing characters on normal flow, SMEW predicts unknown attacks with anomaly flow.Proposing an Intrusion Response Technical ArchitectureMost of active intrusion response technologies are covered.
前者依据特定攻击发生的历史规律,预测网络攻击的未来发生次数,同时分析了时间粒度对预测结果的影响,以及算法对周期性攻击和非周期性攻击的预测效果;后者通过建立正常流量测度指标,对新型攻击的发生进行预测。
-
IT者网站提供英文翻译,未经授权请勿转载】 Atttack incident data-base according to network hacker (Web Hacking Incidents Database, by Web application safe and allied WASC initiates) year reports information shows, filch gold or the biggest motivation that purloin data still is not hacker attack, although involve data in recent years,larcenous attack shows clear ascendant trend.
黑客攻击网站的主要目的是损毁网站声誉?根据网络黑客攻击事件资料库(Web Hacking Incidents Database,由Web应用安全联盟WASC发起的)的年度报告信息显示,窃取钱财或者盗取数据仍然不是黑客攻击的最大动机,虽然近年来涉及数据盗窃的攻击呈明显上升趋势。
-
At present ,most of research in the area of attacks has focused on classifying and categorizing attacks and the analysis of details of a specific attack.
目前,关于攻击的大多数研究都集中于攻击的分类和攻击细节的分析上,仅靠这些还很难掌握攻击的本质。
-
XSS worms will become increasingly intelligent and highly capable of carrying out dilapidating attacks such as widespread network denial of service attacks, spamming and mail attacks, and rampant browser exploits.
跨站脚本蠕虫将变得越来越聪明,开展这种服务攻击,垃圾邮件攻击和拒绝破损广泛的网络攻击的能力,以及猖獗的浏览器攻击。
-
Mage: Magic Attack Like War Dancers and Hydras, Mages have a pattern attack, meaning they can damage several creatures with a single attack.
法师:魔法攻击像战舞者与多头蜥那样,法师也具备组合攻击的能力,也就是说,在同一次攻击中杀伤多组对象生物。
-
By analyzing the advantage and limitations of attack tree model, present a demand that we establish a new attack model for anti-attack test by integrating the attack multi-attribute classification.c Establish a penetration attack tree model for anti-attack test by integrating characteristics of multi-attribute attack classification and attack tree model, redefining attack tree nodes and redescribing the relations of them.
建立了一个面向抗攻击测试的渗透攻击模型。综合多属性攻击分类与攻击树模型的特点,通过对攻击树节点的重新定义和节点间关系的重新描述,建立了一个面向抗攻击测试的基于攻击树的渗透攻击模型。该模型能够描述渗透攻击不同阶段的特征,各种渗透攻击之间的属性关系和条件依赖关系,进而能够合理的组织渗透攻击,为渗透攻击的实施提供方案,从而满足抗攻击测试中对目标精确测试的要求。
-
A J-10 prototype parking outside the hanger of the CAC test site 停在成飞试飞基地挂架外的J-10原型机 In addition to the PL-8 short-range infrared-guided air-to-air missile reportedly derived from Israeli Rafael Python-3 technology, the J-10 could also carry Russian Vympel R-73 (AA-11) short-range and R-77 (AA-12) medium-range missiles equipped by Chinese Flankers.
除了可以携带源于以色列怪蛇3的短程红外寻的空空导弹霹雳8以外,J-10还可以携带已经装备中国侧卫战斗机的俄罗斯的r-73短程和r-77中程导弹,为了满足超视距攻击的需要他还可以携带发展中的霹雳-11和霹雳-12中程空对空导弹。
-
In testing datasets, Snmpguess attack is misjudged as normal connection due to hidden feature transformation. We analyzed this attack connection and re-extract characteristics of the connection. The modified attack detection rates go up from 0.08% to 100%..
此外针对测试资料集中的Snmpguess攻击因特徵转换隐藏的问题,造成此一攻击会被误判为正常连线,我们透过分析此种攻击的连线特性,并重新取出连线特徵,修正后此类型攻击的侦测率由0.08%提升至100%。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?