助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   提取攻击 在 互联网技术 分类中 的翻译结果: 查询用时:0.794秒
图标索引 在分类学科中查询
所有学科
互联网技术
电信技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

提取攻击
相关语句
  extracting attack
    The"extracting attack" on steganography is a kind of steganalysis, the purpose of which is to extract the hidden message.
    对于隐写术的提取攻击是一种隐写分析,其目的是将隐藏消息提取出来。
    In fact, extracting attack can be treated as a special kind of cryptanalysis. Spearman correlation coefficient and the correlation attack of cryptanalysis can be used to extracting the hiding message of LSB JPEG steg-anographic schemes.
    提取攻击可以看成是一种特殊的密码分析,利用Speareman相关系数借鉴密码分析中相关攻击的方法,对当前常用的JPEG 图象LSB隐写算法给出了一种有效的提取攻击方法。
  extracting attack
    The"extracting attack" on steganography is a kind of steganalysis, the purpose of which is to extract the hidden message.
    对于隐写术的提取攻击是一种隐写分析,其目的是将隐藏消息提取出来。
    In fact, extracting attack can be treated as a special kind of cryptanalysis. Spearman correlation coefficient and the correlation attack of cryptanalysis can be used to extracting the hiding message of LSB JPEG steg-anographic schemes.
    提取攻击可以看成是一种特殊的密码分析,利用Speareman相关系数借鉴密码分析中相关攻击的方法,对当前常用的JPEG 图象LSB隐写算法给出了一种有效的提取攻击方法。
  “提取攻击”译为未确定词的双语例句
    The intrusion detection system based on characteristic has very high false alarm rate or miss alarm rate, and they also have many other disadvantages such as failing to detect unknown attack, abaining attack patterns manualy and so on.
    基于特征检测的入侵检测系统不仅误报率和漏报率居高不下,而且还存在着不能检测未知攻击和必须手工提取攻击模式等弊病。
短句来源
    According to characteristics of DDoS attacks, we introduce a practical scheme to defend against DDoS attacks which implements in two phases.
    针对DDoS攻击的特点,提出了一种分阶段的防御模型,即第一阶段根据历史IP过滤(HIF),第二阶段提取攻击包特征规则,根据该规则进行进一步的过滤。
短句来源
    This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment. The sensors distributed in network detect attacks, gather attack fingerprint and then send alarm information to the central analyzer, which correlates alarm information and constructs attack path to decide the intruder's origin network address.
    该系统利用分布在网络内的多个网络检测器检测网络攻击,并提取攻击指纹信息,由中央分析器对指纹信息进行相关性分析,构造攻击路径,从而得到入侵者的网络地址.
短句来源
    This model encapsulates the fine-grained components such as clusters and classifiers, and results in the features of detecting distributed intrusions, accelerating the speed of data analysis and processing, and improving the system scalability.
    该模型将用于海量数据分析的相关组件独立出来封装成一个组件事务服务层,通过聚类分析器、分类分析器等多个细粒度组件并行对海量数据进行压缩与分类,提取攻击特征值,从而不仅可以检测分布式入侵,而且加快了数据分析与处理速度,提高了系统的可伸缩性。
短句来源
    A general approach for solving this problem is to do some correlation analysis with these alerts and build attack scenario.
    利用关联分析的方法对海量报警事件进行分析并提取攻击场景是解决此问题的基本手段。
短句来源
更多       
查询“提取攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      


Indirect attack is one of the important means used by network attackers to conceal themselves. This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment. The sensors distributed in network detect attacks, gather attack fingerprint and then send alarm information to the central analyzer, which correlates alarm information and constructs attack path to decide the intruder's origin network address. Compared...

Indirect attack is one of the important means used by network attackers to conceal themselves. This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment. The sensors distributed in network detect attacks, gather attack fingerprint and then send alarm information to the central analyzer, which correlates alarm information and constructs attack path to decide the intruder's origin network address. Compared with the other systems available, this system is more accurate, scalable and can trace back intruder's address in real time.

提出并实现了一个基于网络入侵检测的入侵者定位系统.该系统利用分布在网络内的多个网络检测器检测网络攻击,并提取攻击指纹信息,由中央分析器对指纹信息进行相关性分析,构造攻击路径,从而得到入侵者的网络地址.和已有各种方法相比,该系统有更好的准确性、可扩展性和实时性,可有效地解决可控网络环境下的间接攻击问题.

In view of the demand that distributed attack detection needs massive data, this paper puts forward a cooperative detection model based on component structure. This model encapsulates the fine-grained components such as clusters and classifiers, and results in the features of detecting distributed intrusions, accelerating the speed of data analysis and processing, and improving the system scalability.

本文针对检测分布式入侵时海量数据分析的应用需求,提出一种基于组件结构的协同检测模型。该模型将用于海量数据分析的相关组件独立出来封装成一个组件事务服务层,通过聚类分析器、分类分析器等多个细粒度组件并行对海量数据进行压缩与分类,提取攻击特征值,从而不仅可以检测分布式入侵,而且加快了数据分析与处理速度,提高了系统的可伸缩性。

security devices(e.g.firewalls,IDS's,anti-virus tools etc) that have been widely adopted in enterprise environments may generate huge amounts of independent,raw attack alerts,which are characterized by high false positive ratio and false negative ratio.As a result,it is difficult for users to understand these alerts and respond correspondingly.Therefore,handling the huge number of alerts produced by security devices is becoming a critical and challenging task in network security research.A general approach for...

security devices(e.g.firewalls,IDS's,anti-virus tools etc) that have been widely adopted in enterprise environments may generate huge amounts of independent,raw attack alerts,which are characterized by high false positive ratio and false negative ratio.As a result,it is difficult for users to understand these alerts and respond correspondingly.Therefore,handling the huge number of alerts produced by security devices is becoming a critical and challenging task in network security research.A general approach for solving this problem is to do some correlation analysis with these alerts and build attack scenario.A general survey of the contemporary alerts correlation algorithms was given in this paper by a straight forward classification paradigm,and some problems for future research were addressed.

已经获得广泛应用的防火墙、IDS、防病毒软件等安全设备在运行过程中会产生大量独立的、原始的报警信息,这些报警信息除了具有海量的特点外,还有比较高的误报率和漏报率,导致用户难于对攻击及时做出响应。利用关联分析的方法对海量报警事件进行分析并提取攻击场景是解决此问题的基本手段。通过简单的分类综述了安全领域中报警事件关联算法的研究现状,并指出了需要进一步研究的问题。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关提取攻击的内容
在知识搜索中查有关提取攻击的内容
在数字搜索中查有关提取攻击的内容
在概念知识元中查有关提取攻击的内容
在学术趋势中查有关提取攻击的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社