助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   地址欺骗 的翻译结果: 查询用时:0.614秒
图标索引 在分类学科中查询
所有学科
互联网技术
电信技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

地址欺骗
相关语句
  address spoofing
     IEEE 802.11 Access Control and MAC Address Spoofing
     IEEE802.11访问控制与MAC地址欺骗
短句来源
     IEEE 802.11 MAC Address Spoofing and its Detection Technique
     IEEE 802.11 MAC地址欺骗及其检测技术
短句来源
     IEEE 802.11 MAC frames head are analyzed and MAC Address Spoofing is effectively detected by sequence number analysis method,thus the security of the wireless LAN is enhanced.
     分析了IEEE 802.11MAC帧头部信息,利用序列号分析的方法,对MAC地址欺骗攻击进行有效的检测,从而提高无线局域网的安全性。
短句来源
     We solve the address spoofing and flood attacking problems by virtual circuit.
     引如虚电路机制可以解决在原层次网络体系结构中所存在的地址欺骗问题以及洪水攻击问题等。
短句来源
     Conventional TCP/IP network suffers some problems, such as simplex services, source address spoofing and implosion of negative acknowledgement in multicast, in the course of its development.
     传统的TCP/IP网络在发展过程中遇到了一些难以克服的问题,比如服务单一、源地址欺骗、多播中否定应答风暴等。
短句来源
更多       
  address deceiving
     Analyses of UDP address deceiving and counter measure
     UDP地址欺骗剖析及其对策
短句来源
     The action of forging UDP datagram is analyzed by modifying the source address and port in a UDP datagram and a method is put forward which can avoid UDP address deceiving by adding router record IP-options in IP header, and it has been proved by experiments.
     对伪造数据报头中的源地址和端口的UDP地址欺骗的入侵行为进行了分析并提出了一种通过添加IP记录路由选项的方法来防止UDP地址欺骗,研究结果表明,这种方法可以一定程度上防止UDP地址欺骗的入侵行为。
短句来源
  “地址欺骗”译为未确定词的双语例句
     And the scheme for communication between the hosts based on Proxy ARP service is proposed in detail, which is one of the key technologies employed in Super VLAN.
     运用Proxy ARP服务和“MAC地址欺骗”的思想,设计了Super VLAN内的主机之间的通信方案,这是实现Super VLAN的关键技术之一。
短句来源
     Common network attacks such as IP spoofing,source route spoofing,ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
     针对常见的IP地址欺骗、IP源路由欺骗、ICMP重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法.
短句来源
     However, Teredo does not support symmetric NAT users and cannot allocate stable IPv6 addresses for the users, and also has security problems.
     但是,该协议不能为用户分配固定的IPv6地址,不支持对称类型的NAT用户,并且不能有效防御源地址欺骗攻击.
短句来源
     Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.
     另一些方法基于IP地址和数据报长度的统计特征,但这些方法在IP地址欺骗攻击时检测率急剧下降.
短句来源
     The article focuses on the frequent strokes of address resolution protocol (ARP) virus on local area network at present,analyzes the security holes of ARP as well as fundamental principle of virus attacks,discusses serious problems about MAC/CAM attack,DHCP attack and MAC deceit resulting in abnormal movements of local area network,and further discusses the dual-direction protective measures and appropriate tactics in the multiple re- spects about personal computer DHCP service and network exchange equipment in local area network.
     本文针对目前局域网中地址解析协议(ARP)病毒的频繁发作,分析了ARP安全漏洞及病毒攻击原理,讨论了“中间人”攻击、MAC/CAM攻击、DHCP攻击、地址欺骗等导致局域网非正常运行的严重问题,进一步探讨在局域网内的主机、DHCP服务和网络交换设备等多方面采取相关的防护措施和应对策略。
短句来源
更多       
查询“地址欺骗”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  address spoofing
Address spoofing and collisions are not possible; however, an adversary can observe the messages sent between non-faulty nodes.
      
A preventive measure to DDoS attacks is to ensure the authenticity of packets by eliminating source address spoofing.
      
Attackers benefit from source address spoofing and are likely to deploy it whenever possible.
      
As this scheme is static, without additional security protections the protocol is vulnerable to attacks such as address spoofing.
      
Defeating denial of service attacks which employ IP source address spoofing, May 2000.
      
更多          
  address spoof
An effective defense against spoofing-based DoS attacks on DNS servers requires source address spoof detection.
      


A router based approach to authenticate TCP/IP network activities dynamically is presented. The objective is to enhance network security by giving each user an identity that cann′t be forged. The model consists of a security authentication server running on router, a security client running on user machine and a log server running on NMS (network management station). Discussed in detail here are the 128bits key dynamic authentication process, the management of key and security log, and the effectiveness of...

A router based approach to authenticate TCP/IP network activities dynamically is presented. The objective is to enhance network security by giving each user an identity that cann′t be forged. The model consists of a security authentication server running on router, a security client running on user machine and a log server running on NMS (network management station). Discussed in detail here are the 128bits key dynamic authentication process, the management of key and security log, and the effectiveness of this model. This model makes it easier for network manager to solve the problem of IP spoofing, and to trace network hacking activities.

描述了在TCP/IP网络中,如何通过路由器对入网的机器进行动态安全认证以防止IP地址或使用者的身份被盗用,从而增强网络安全.详细地介绍了这种基于路由器的安全认证方法的实现模型,该模型由在路由器上运行的安全认证服务器和在用户机器上运行的安全客户程序,以及在网络管理工作站上运行的日志服务器构成;同时,还介绍了基于128位密钥的动态认证过程,以及密钥和日志记录的管理,最后探讨了这些方法的有效性及安全性.所描述的方法可以有效地解决如地址欺骗、非法网络活动的记录和追查等问题.

Mobility makes things complicated in mobile agent communication. On one hand, a practical communication mechanism should make the location of an agent transparent to the agent programmer and thus poses a burden on the agent system to keep track of an agent. On the other hand, because of the asynchronous nature of message passing and agent migration, how to guarantee the message delivery to highly mobile agents is still an open question in mobile agent systems. In many currently available mobile agent systems...

Mobility makes things complicated in mobile agent communication. On one hand, a practical communication mechanism should make the location of an agent transparent to the agent programmer and thus poses a burden on the agent system to keep track of an agent. On the other hand, because of the asynchronous nature of message passing and agent migration, how to guarantee the message delivery to highly mobile agents is still an open question in mobile agent systems. In many currently available mobile agent systems these problems are left unsolved and the hard nuts are left to agent programmers. The communication mechanism that we proposed in Mogent system implemented location transparency and reliable message delivery. But it also has the shortcomings of large location updating overhead, constraints of agents' mobility and vulnerability to the address spoofing attack. In this paper we introduce an improved algorithm based on that of Mogent system. In our improved algorithm, each mobile agent has a Mailbox which buffers the messages sent to it. The Mailbox is detached from its owner agent in the sense that the agent and its mailbox can reside at different hosts. If an agent will not communicate with others at its target host, it will migrate to the host directly and leave its mailbox at the previously located host. In this way the location updating overhead is saved and the constraints of agents' mobility is decreased. An interlocking mechanism is also employed in our algorithm to avoid the address spoofing attack during the location updating process. The improved algorithm can work adaptively according to different migration and communication paradigms in different applications. As shown in the experiments, the algorithm is preferable in the cases that mobile agents migrate frequently but communicate rarely.

如何实现远程 Agent通信的位置透明性 ,保证消息不会因为目标 Agent迁移而丢失 ,一直是移动 Agent通信所面临的难题 ,在现有的很多移动 Agent系统中都没有得到解决 .作者在 Mogent系统中提出的通信算法初步实现了通信的位置透明性和可靠的消息传输 .该文在原有算法的基础上提出了一种改进的适于多种迁移和通信模式的移动 Agent通信算法 ,进一步减少了 Agent的地址注册开销和迁移受到的限制 ,并给出了一种避免地址欺骗攻击的解决方案

As TCP/IP protocol is being used more and more widely, the security risk becomes more and more severe and the loss caused by security flaws becomes greater and greater. Now, the security of Internet has become the focus of global attention. The main radical solution for globally protecting enterprise networks against malicious traffic is to enforce some network security measures, such as cryptography, firewall etc, on the existing Internet environment. Unfortunately, the current firewall technology does not...

As TCP/IP protocol is being used more and more widely, the security risk becomes more and more severe and the loss caused by security flaws becomes greater and greater. Now, the security of Internet has become the focus of global attention. The main radical solution for globally protecting enterprise networks against malicious traffic is to enforce some network security measures, such as cryptography, firewall etc, on the existing Internet environment. Unfortunately, the current firewall technology does not solve the inner security completely. To solve this problem, this paper presents a firewall system based on Linux--L Firewall, which combined packet filter and proxy technology. Proxy and authentication is implemented on B1 level operating system. The paper emphasizes on the frame of L Firewall, especially on the implementation of packet filter module. L Firewall not only provides HTTP, FTP proxy and packet filter, but also provides content filter, network address translation to protect network from IP spoofing and IP source route spoofing. L Firewall tallies with GB/T17900-1999 and GB/T18020-1999. It passed the security test of Ministry of Public Security of China. The performance test executed by Intel Corporation shows that the flow of packet filter is near to that of network, and the flow of HTTP is 30% under 100M network environment.

针对目前的防火墙技术不能有效地解决网络内部安全问题 ,提出一种结合包过滤和代理技术 ,并将代理服务器与认证系统建立在 B1级操作系统上的防火墙系统。所开发的基于 Linux平台的防火墙系统不仅实现了 HTTP代理、FTP代理和包过滤功能 ,还实现了内容过滤、地址翻译以及对 IP地址欺骗、IP源路由欺骗等攻击的防范。符合国标 GB/ T1 790 0 - 1 999、GB/ T1 80 2 0 - 1 999,通过了公安部安全产品检测 ;Intel性能测试表明 :1 0 0 M网络环境下包过滤可达到线速 ,HTTP代理为 30 %。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关地址欺骗的内容
在知识搜索中查有关地址欺骗的内容
在数字搜索中查有关地址欺骗的内容
在概念知识元中查有关地址欺骗的内容
在学术趋势中查有关地址欺骗的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社