助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   honey pot 的翻译结果: 查询用时:0.175秒
图标索引 在分类学科中查询
所有学科
互联网技术
计算机软件及计算机应用
图书情报与数字图书馆
更多类别查询

图标索引 历史查询
 

honey pot     
相关语句
  蜜罐
     Design of Honey Pot System Based on VMWare in Windows
     Windows下基于VMWare的蜜罐系统设计
短句来源
     The high-interactive honey pot system was configured by weakening system mode. The Windows 2000 Professional was created by using VMWare in host.
     以弱化系统方式配置高交互的蜜罐系统,在宿主机使用VMWare可虚拟出Windows2000Professional。
短句来源
     According to the conclusion of this thesis, we can claim that honey pot can improve the capability of P2DR security model.
     本文通过试验验证,表明蜜罐系统有效的提高了P~2DR模型的检测功能,应用加入蜜罐后的P~2DR模型对公安网络的安全具有明显的促进作用。
短句来源
     The Method of Perfecting the Honey Pot System in Intrusion Detection
     完善入侵检测蜜罐系统的方法
短句来源
     The Research on Honey Pot Software Honeyd
     蜜罐软件Honeyd的研究
短句来源
更多       
  蜜罐技术
     The safety of shielded-subnet firewall will be enhanced in virtue of the technology of Honey Pot,which can technically rebuild the parameter of the net to make a trap to the aggressor.
     笔者认为,借鉴蜜罐技术的思路,对参数网络进行技术上的改造,使其成为入侵者的“陷阱”,可以更大限度的提高屏蔽子网型防火墙的安全性。
短句来源
  蜜罐系统
     Design of Honey Pot System Based on VMWare in Windows
     Windows下基于VMWare的蜜罐系统设计
短句来源
     The high-interactive honey pot system was configured by weakening system mode. The Windows 2000 Professional was created by using VMWare in host.
     以弱化系统方式配置高交互的蜜罐系统,在宿主机使用VMWare可虚拟出Windows2000Professional。
短句来源
     According to the conclusion of this thesis, we can claim that honey pot can improve the capability of P2DR security model.
     本文通过试验验证,表明蜜罐系统有效的提高了P~2DR模型的检测功能,应用加入蜜罐后的P~2DR模型对公安网络的安全具有明显的促进作用。
短句来源
     The Method of Perfecting the Honey Pot System in Intrusion Detection
     完善入侵检测蜜罐系统的方法
短句来源
     Definite State Machine of Honey Pot System Model
     蜜罐系统模型的有限自动机
短句来源
更多       
  “honey pot”译为未确定词的双语例句
     Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker's action uses honey pot. Intrusion detection helps system administrator monitor, audit and assess the system state easily and available.
     入侵检测具有监视分析用户和系统的行为、审计系统配置和漏洞、评估敏感系统和数据的完整性、识别攻击行为、对异常行为进行统计和审计、自动地收集和系统相关的补丁、使用诱骗服务器记录黑客行为等功能,使系统管理员可以较有效地监视、审计、评估自己的系统。
短句来源
     Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, add up and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker's action uses honey pot. Intrusion detection helps system administrator monitor, audit and assess the system state easily and effectively.
     入侵检测具有监视分析用户和系统、审计系统配置和漏洞、评估敏感系统和数据的完整性、识别攻击行为、对异常行为进行统计和审计、自动地收集和系统相关的补丁、使用诱骗服务器记录黑客行为等功能,使系统管理员可以较有效地监视、审计、评估自己的系统,成为继防火墙之后的又一道安全防线。
短句来源
     The definition of network cheat and its functions in protection of network are described. The techniques of network cheating such as Honey Pot, cheating space, network flow simulation, multiple address translation, network dynamic configuration and creating false information are introduced.
     简述网络欺骗的概念、作用以及主要的欺骗技术 ,如 Honey Pot、欺骗空间、技术网络流量仿真、多重地址转换、网络动态配置和创建欺骗信息。
短句来源
查询“honey pot”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  honey pot
We do not have to have flies buzzing around the honey pot--the honey pot being a high-value tanker or an AWACS in close proximity.
      
The queen makes a waxen honey pot in which nectar is stored.
      
The extensibility of NoAH allows us the creation of large-scale honey pot farm, able to monitor distributed address space in a controlled environment.
      
This class provides a technical introduc tion to the art of building honey pot systems for intrusion detection and burglar-alarming networks.
      
In the Methods section we calculate an upper bound for the relative virus cluster using the honey-pot architecture.
      
更多          


The definition of network cheat and its functions in protection of network are described. The techniques of network cheating such as Honey Pot, cheating space, network flow simulation, multiple address translation, network dynamic configuration and creating false information are introduced.

简述网络欺骗的概念、作用以及主要的欺骗技术 ,如 Honey Pot、欺骗空间、技术网络流量仿真、多重地址转换、网络动态配置和创建欺骗信息。

This thesis analyzes the implement of intrusion deception, then defines the intrusion deception system formalization, describes its architecture. Due to introduce the concept of intrusion redirect, the intrusion detection and deception integrates seamlessly, it remedies the honey pot wait for windfalls passively. Lastly, a model of intrusion deception is given.

分析了入侵诱骗的实现方式 ,形式化地定义了入侵诱骗系统 ,提出了入侵诱骗的体系结构 ,引入了入侵行为重定向的概念 ,将入侵检测和入侵诱骗有机地结合起来 ,弥补了“HoneyPot”的守株待兔的不足 ,对入侵诱骗系统做出了总体设计 ,并给出了一个入侵诱骗系统的实现模型

HoneyPot system is one of intrusion trap technologies .And honeypot is of importance in active defence. This Paper is written on the subject of honey pots. It will cover many aspects of a honeypot including what they are,how they work and technologies adopted in a honeypot.What's more ,this paper analyzes several disadvantages of a honeypot system.

HoneyPot系统就是入侵诱骗技术中的一种,在网络安全中起着主动防御的作用。本文主要论述HoneyPot系统的工作方式及在系统中所采用的技术,并对其存在的问题做出了分析。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关honey pot的内容
在知识搜索中查有关honey pot的内容
在数字搜索中查有关honey pot的内容
在概念知识元中查有关honey pot的内容
在学术趋势中查有关honey pot的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社