英语人>网络例句>intrusion 相关的网络例句
intrusion相关的网络例句

查询词典 intrusion

与 intrusion 相关的网络例句 [注:此内容来源于网络,仅供参考]

Intrusion detection analysis technology is the core of intrusion detection system which includes abnormity intrusion detection and abused intrusion detection.

入侵检测分析技术是入侵检测系统的核心,主要可分为异常入侵检测和误用入侵检测。

The DIDAPPER (distributed intrusion detector with apperception) system presented in this paper is a distributed intrusion detector with apperception.

DIDAPPER( distributed intrusion detector with apperception)系统是一种具有认知能力的分布式入侵检测系统。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Among the diversity of security technologies, intrusion detection technology is one of the focuses. This thesis at first elicits the situation of nowadays intrusion detection technology and Intrusion Detection System after explaining the basic concept of intrusion detection. Then on the basis of analyzing some representative IDSs the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity, flexibility, interoperability etc. Therefore new technologies are needed for explored to improve the overall performance of IDS.

入侵检测系统是目前网络安全领域的一个研究热点,本文首先从入侵检测的基本概念出发,阐述了入侵检测技术以及入侵检测系统的发展现状,通过分析当前一些有代表性的入侵检测系统指出了入侵检测系统存在的一些不足,在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。

System incentive and alternation of attacker's strategies are not taken into full consideration in current intrusion response research. An intrusion response model (intrusion response based on attack graph, IRAG) based on the attack graph is proposed to solve this problem.

针对当前入侵响应工作中存在的不能充分考虑系统的收益,以及不能充分考虑攻击者策略变化因素等问题,提出了一种基于攻击图的入侵响应IRAG(intrusion response based on attack graph)模型。

The severe seawater intrusion exists in certain eel farming factories within Changle, Fuzhou, in certain prawn farm within Jiuzhen county, Zhangzhou, and in certain saltern within Xiuyu district, Putian, all belonging to seawater intrusion in human activity areas. The maximum concentration of Cl and mineralization within those severe intrusion areas are 5629.00 mg/L and 33.16 g/L respectively. The slight seawater intrusion is monitored in Quangang district, Quanzhou, where natural conditions are kept. No seawater intrusion is monitored in Dongchong peninsula, Ningde. No soil salinization is monitored except Zhangzhou where the sand is slightly salinized.

在福州长乐市近岸某鳗鱼养殖片区、漳州漳浦县近岸某对虾养殖片区、莆田市秀屿区某盐田附近监测到严重海水入侵,均属人类开发活动影响区域内的海水入侵,严重入侵区域氯度最高达5629.00 mg/L,矿化度最高达33.16 g/L;在泉州市泉港区某自然村监测到轻度入侵,属自然状态下的海水入侵;在宁德东冲半岛外浒沙滩附近未监测到海水入侵;在漳州断面监测到土壤盐渍化,为轻度盐渍化土,其他断面为非土壤盐渍化土。

Lithologies are mostly sand and carbonate rocks, caps are mud rock, shale and magmatite. Entrap types are anticline, fault block rebuilt by breaking and the screened entrap diapered rock mass. The composition is CO_2, N_2, CH_4, C_2H_6 and He etc. It is magma air source body and its geologic fashions are intrusion and buried volcanic conduit. The relations between gas reservoirs and gas source bodies have three types: magma intrusion-breaking-communicated gas reservoir, magma intrusion-contacted CO_2 reservoir and buried volcanic conduit-contacted gas reservoir. The CO_2 migration in magma intrusion is consisted of fusing and crystallizing phases;it in volcanic conduit is consisted of near-surface effusion and crystallizing phases.The buoyancy of CO_2 in water far more than migration resistance in breaking or chink, CO_2 is easy float upward, the floating can results in differentiation of different density gases and concentration of sealed gas. The gas in sand reservoir firstly migrate into the higher porosity and coefficient of permeability sand, and along with the pressure going up it migrate into the lower. In magma intrusion-breaking-reservoir migration, CO_2 firstly migrate into watered breaking, began gravity differentiation and concentrate, the gas pressure time and again go up, CO_2 migrate into reservoir and concentrate under expansibility as the pressure reach upward a given extend. The CO_2 in reservoir experience four breaking modes: chemistry deposition, dissolution, diffusion and mechanic breaking, the pressure balance can be broken by faulting and the CO_2 will further migrate and form new reservoir.

济阳坳陷已发现的八里泊、阳25、平方王、平南、高青、花17 CO_2气藏主要储集层位有奥陶系、中生界、沙四段、沙三段、沙一段、馆陶组和明化镇组,储集层岩性以砂岩和碳酸盐岩为主,盖层以泥质岩、页岩和岩浆岩为主。;圈闭类型主要为受断裂改造的背斜、断块及刺穿岩体遮挡圈闭。;气体成分主要有CO_2、N_2、CH_4、C_2H_6、He等。;主要气源体为岩浆气源体,气源体的主要地质形式为侵入体和埋藏的火山通道。;气藏和气源体的空间关系有岩浆侵入体一断裂一气藏沟通型、岩浆侵入体-CO_2气储集层接触型和埋藏火山通道-气储集层接触型三种类型。;岩浆侵入体CO_2气运移分为熔融运移阶段和结晶运移阶段,火山通道中CO_2气运移分成近地表喷发阶段和结晶运移阶段。;断裂中,CO_2在水中的浮力远大于运移阻力,CO_2气容易上浮,CO_2在断裂中的易浮性导致不同密度气体的分异和走向上封闭的断裂气体相对富集。;气体在砂岩储集层运移聚集具有选择性,会优先进入孔隙度和渗透率较高的砂岩,随着压力增加,才会进入孔隙度和渗透率较低的砂岩;在岩浆气源体-断裂-储集层空间输导格架下,CO_2气在膨胀力的驱动下,首先进入含水的断裂并重力分异而聚集,气体压力会不断增高,当压力增至一定程度,CO_2气会向高孔隙度、渗透率的储集层运移并聚集。;在岩浆气源体-储集层接触空间输导格架下,CO_2气受膨胀力的驱动直接向储集层运移并聚集。;成藏的CO_2气会经历化学沉淀、溶解、扩散和机械破坏四种破坏方式,会受断裂切割而打破压力平衡,沿断裂进一步运移和聚集成藏。

With intrusion detection technology explored, and the cause of some important issues in intusion detection field that must be resolved immediately annalyzed, an Enhanced Intrusion Detection Agent ,, is presented, which works under the Agent-based Distributed Intrusion Detection framework, with an enhanced detection engine inside, and obtaining decision-making information from an Assistant Information Collecting Agent .

本文对入侵检测技术进行了分析和研究,通过分析入侵检测领域亟待解决的一些问题产生的根源,提出了在基于软件代理的分布式入侵检测模型框架下,使用一种以增强型入侵检测引擎为核心的入侵检测代理,并引入辅助的信息收集代理,协同解决基于模式匹配的网络入侵检测系统高虚警率低检测效率的设计思想,并在此想法的基础上实现了一个增强型的入侵检测代理(Enhanced Network Intrusion Detection Agent, E_NIDA)和一个辅助的信息收集代理(Assistant Information Collecting Agent,。A_ICA)。

In this paper, An architecture for IDS called IDBAS(Intrusion Detection Based on Aglets and Snort) is proposed when we research the new technology called mobile agent and the current IDS architectures based on mobile agents which commonly have a number of problems that limit their configurability, scalability or efficiency.

本文在研究现有入侵检测系统和新兴的代理技术的基础上,提出一种新的基于移动代理的入侵检测系统架构IDBAS(Intrusion Detection Based on Aglets and Snort)。

A data sharing and cooperative access control policy model aiming at the weakness of collaboration and self-security in DIDS(Distributed Intrusion Detection System) is presented.

针对分布式入侵检测系统(DIDS:Distributed Intrusion Detection System)面临的协作和自身安全问题,提出了一个分布式入侵检测系统和多组件入侵检测系统间的数据共享策略和合作访问控制策略模型。

第1/45页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Intrusion / Confusion
推荐网络例句

I use an example quoted by Hu Jiaqi:"It is reported that America separates the DNA of a kind of virus by making use of genetic technology and combines it with another kind of DNA. Finally, they get a kind of virulent biological agent called a "pyrotoxin". Someone discloses in private that 20 grams of such a kind of biological agent could result in the global death of 6 billion people due to infection."

我在这里例举胡家奇所引用过的例子:"据报道,美国利用转基因技术,将一种病毒的DNA分离出来,与另外一种DNA进行结合,拼结成一种剧毒的"热毒素"生物战剂,且私下有人透露,这种生物战剂只需20克,就可以导致全球60亿人全部感染死亡。"

Waiting, for the queers and the coons and the Reds and the Jews.

等待着疯子和黑人还有红色共产主义者还有犹太人

"Everybody talks about what a horrible job it is to brief the press,but I love these briefings!"

&每个人都说,简报新闻是一份多么糟糕的工作,,但是我爱这些简报。&