您要查找的是不是:
- worm attack detection 蠕虫攻击检测
- Defenses in terms of attack detection algorithms are categorized under section “Attack detection algorithms”. 在“攻击检测算法”一节中在攻击检测算法方面对防御系统进行分类。
- We identify the characteristics in attack detection algorithms and attack responses by reviewing defenses that have appeared in the literature. 我们通过评论出现在文献中的防御来鉴别攻击检测算法和攻击响应的特点。
- The influence of wormhole attack on the node's number of neighbors is analyzed,and a logic topology based method is proposed for attack detection. 分析了虫孔攻击对于网络节点邻居数目的影响,提出了一种基于网络逻辑拓扑的攻击检测方法。
- In the end, the paper expects the future of research on AIRS by discussing the prospect of using composite attack detection and attack prediction techniques in response decision. 论文最后对未来自动入侵响应系统的研究进行了展望,指出了将复合攻击识别和攻击预测应用在响应决策中的意义。
- Communicating protocols refer to the protocols used to send control messages between various nodes of a network to coordinate attack detection or attack responses. 通信协议指出用来在一个网络的不同节点间发送控制消息以调整攻击检测或攻击响应的协议。
- Microsoft Severs Web Link to Head Off Worm Attack 微软中断网络连接防范蠕虫攻击
- Once the monitored network links are congested, the attack detection algorithm identifies the type of network flows/connections that contribute to the congestion. 一旦受监控的网络连接被拥塞,攻击检测算法鉴别导致拥塞的网络流/连接的类型。
- The model can make up for some of the methods of attack detection difficult in traditional DIDS, thereby increasing the Intrusion Detection rates of IDS. 该模型可以弥补传统分布式入侵检测系统难以检测的一些攻击手法,从而提高了IDS的入侵检测率。
- Attack detection algorithms identify attack traffic from the network traffic monitored and attack responses act against attack traffic by triggering filtering. 攻击检测算法从监控的网络流量中鉴别攻击流量,攻击响应通过触发过滤阻止攻击流量。
- Recentely, more and more worm attacks happen on Internet. According to this situation, honey-pot technology with IDS and data mining is used to resolve the problem; Honeypot is put in DMZ. Internet大面积遭受蠕虫攻击的事件时有发生,针对这种问题,引入Honeypot技术,结合入侵检测系统(IDS)、数据挖掘提出了一种解决办法:将Honeypot置于DMZ中,利用其欺骗地址空间技术覆盖服务器中没有用到的IP地址,捕获蠕虫;
- Utilizing features of grey theory that less data is needed in model construction,and method that each node undertakes detection tasks,this model will save energy consumed in attack detection. 该模型利用灰理论建模所需数据较少的特点,结合各节点分担检测任务的方法,可节约检测攻击行为所需耗能。
- How can I worm out of giving that report? 我怎么逃脱不做那个报告呢?
- Destroyers: These give a hefty gun attack detection bonus, along with substantial morale and organization bonuses. They also give a slight advantage in gin attack, speed, and torpedo attack. 驱逐舰:给与有力的炮火支持,并士气和组织度的奖励。
- I think this worm is a larva of a butterfly. 我觉得这虫子是蝴蝶的幼虫。
- In the case of protecting against DDOS attacks, an attack detection algorithm identifies the characteristics of the traffic flow that will be policed. 在防止DDOS攻击的情况下,一个攻击检测算法鉴别会被管制的流量的特性。
- Network-based anomaly dectection systems have advantages such as early detecting and novel attack detecting. 其中,基于网络的异常检测具有能发现新攻击、能及早做出响应等优势。
- As the saying goes the early bird catches the worm. 谚语说,早起的鸟有食吃。
- The vet prescribed a medicine to worm my puppy. 兽医开了一种药驱除我那小狗体内的寄生虫。
- Even a worm will turn. You had better give her a way out. 弱者被逼太甚,也会进行抗争,你最好还是给她一条出路。
