助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   address spoofing 的翻译结果: 查询用时:0.17秒
图标索引 在分类学科中查询
所有学科
互联网技术
电信技术
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

address spoofing
相关语句
  地址欺骗
     IEEE 802.11 Access Control and MAC Address Spoofing
     IEEE802.11访问控制与MAC地址欺骗
短句来源
     IEEE 802.11 MAC Address Spoofing and its Detection Technique
     IEEE 802.11 MAC地址欺骗及其检测技术
短句来源
     IEEE 802.11 MAC frames head are analyzed and MAC Address Spoofing is effectively detected by sequence number analysis method,thus the security of the wireless LAN is enhanced.
     分析了IEEE 802.11MAC帧头部信息,利用序列号分析的方法,对MAC地址欺骗攻击进行有效的检测,从而提高无线局域网的安全性。
短句来源
     We solve the address spoofing and flood attacking problems by virtual circuit.
     引如虚电路机制可以解决在原层次网络体系结构中所存在的地址欺骗问题以及洪水攻击问题等。
短句来源
     Conventional TCP/IP network suffers some problems, such as simplex services, source address spoofing and implosion of negative acknowledgement in multicast, in the course of its development.
     传统的TCP/IP网络在发展过程中遇到了一些难以克服的问题,比如服务单一、源地址欺骗、多播中否定应答风暴等。
短句来源
更多       
  “address spoofing”译为未确定词的双语例句
     NDP(Neighbor Discovery Protocol, NDP) is an important part of IPv6 protocol, which corresponds to a combination of ARP protocol, ICMP router discovery and ICMP redirect function in IPv4. This paper analyses security problem that may be subjected to NDP, especially IP address spoofing attack.
     邻居发现协议(NeighborDiscoveryProtocol,NDP)作为IPv6协议的重要组成部分,取代了IPv4中的ARP协议、ICMP路由发现和ICMP重定向功能。
短句来源
     Henan Telecom broadband management system takes advantages of extended DHCP technology, adopts central accounting and distributed access, sets up theauthentification and accounting center in Zhengzhou, whereas each city has its own management functions, provides users good authentification system and flexible accounting, and solves the problem of address spoofing.
     河南电信宽带综合业务管理系统利用扩展的DHCP技术,采用集中计费、分布接入的模式,在郑州设置集中的认证计费系统,各城市具有分权管理的功能,为用户提供良好的身份认证机制和灵活的计费方式,并解决地址盗用问题。
短句来源
     Applications of our system are manifold: prevention of source address spoofing, DDoS attack mitigation, distributed firewall-like filtering, collecting traffic statistics, traceback, distributed network debugging, support for forensic analyses and many more.
     此系统的应用是多种多样的:防止源地址哄骗,ddos攻击的减轻,分布式类防火墙过滤,收集网络状态,回溯,分布式网络调试,支持辨证分析等等。
短句来源
     DDoS, issued in recent years, is one of the severe threats on the Internet. DDoS uses many attack means and styles, including flooding and source address spoofing.
     DDoS攻击是Internet目前面临的最严峻的威胁之一。
短句来源
  相似匹配句对
     address
     领导讲话
     Address Space Spoofing Using Address Resolution Protocol
     利用地址解析协议的地址空间欺骗技术
短句来源
     Detecting Wireless LAN MAC Address Spoofing Attack
     无线局域网MAC地址欺骗攻击的检测
短句来源
     CLOSING ADDRESS
     第十届亚洲钟表工商业促进研讨会闭幕致词
短句来源
     ARP Spoofing and Countermeasures
     ARP欺骗攻击及其防范
短句来源
查询“address spoofing”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  address spoofing
We show that the maximum tolerable t in this case is identical to the maximum tolerable t when collisions and address spoofing are not allowed.
      
We demonstrate this by describing a rule to check for address spoofing.
      
We compare the data sets whenever possible and correlate them to infer the prevalence of random address spoofing.
      
Unfortunately source-address spoofing makes it harder to pushback filters without causing collateral damage.
      
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
      
更多          


Mobility makes things complicated in mobile agent communication. On one hand, a practical communication mechanism should make the location of an agent transparent to the agent programmer and thus poses a burden on the agent system to keep track of an agent. On the other hand, because of the asynchronous nature of message passing and agent migration, how to guarantee the message delivery to highly mobile agents is still an open question in mobile agent systems. In many currently available mobile agent systems...

Mobility makes things complicated in mobile agent communication. On one hand, a practical communication mechanism should make the location of an agent transparent to the agent programmer and thus poses a burden on the agent system to keep track of an agent. On the other hand, because of the asynchronous nature of message passing and agent migration, how to guarantee the message delivery to highly mobile agents is still an open question in mobile agent systems. In many currently available mobile agent systems these problems are left unsolved and the hard nuts are left to agent programmers. The communication mechanism that we proposed in Mogent system implemented location transparency and reliable message delivery. But it also has the shortcomings of large location updating overhead, constraints of agents' mobility and vulnerability to the address spoofing attack. In this paper we introduce an improved algorithm based on that of Mogent system. In our improved algorithm, each mobile agent has a Mailbox which buffers the messages sent to it. The Mailbox is detached from its owner agent in the sense that the agent and its mailbox can reside at different hosts. If an agent will not communicate with others at its target host, it will migrate to the host directly and leave its mailbox at the previously located host. In this way the location updating overhead is saved and the constraints of agents' mobility is decreased. An interlocking mechanism is also employed in our algorithm to avoid the address spoofing attack during the location updating process. The improved algorithm can work adaptively according to different migration and communication paradigms in different applications. As shown in the experiments, the algorithm is preferable in the cases that mobile agents migrate frequently but communicate rarely.

如何实现远程 Agent通信的位置透明性 ,保证消息不会因为目标 Agent迁移而丢失 ,一直是移动 Agent通信所面临的难题 ,在现有的很多移动 Agent系统中都没有得到解决 .作者在 Mogent系统中提出的通信算法初步实现了通信的位置透明性和可靠的消息传输 .该文在原有算法的基础上提出了一种改进的适于多种迁移和通信模式的移动 Agent通信算法 ,进一步减少了 Agent的地址注册开销和迁移受到的限制 ,并给出了一种避免地址欺骗攻击的解决方案

Conventional passive network suffers some problems,such as simplex services, source address spoofing and implosion of negative acknowledgement in multicast, in the course of its development. Active Network lends a novel method to settle these problems, and be taken notice by network researchers. It has become the hotspot for settling the next network architecture. This paper analyses the shortcomings of the passive network in term of architecture. It introduces the essential characteristics, and designs...

Conventional passive network suffers some problems,such as simplex services, source address spoofing and implosion of negative acknowledgement in multicast, in the course of its development. Active Network lends a novel method to settle these problems, and be taken notice by network researchers. It has become the hotspot for settling the next network architecture. This paper analyses the shortcomings of the passive network in term of architecture. It introduces the essential characteristics, and designs a active network architecture. We have implemented a prototype system-ANSoft-with some novel technologies, such as code caching and demand loading. This prototype system possesses the essential characteristics of active network, and has its own characteristics.

传统的被动网络在发展过程中遇到了一些难以克服的问题 ,如服务单一、源地址欺骗、多播中否定应答风暴等 ,主动网络为解决这些问题提供了新的思路 ,并受到了网络界的重视 ,在国际上已成为解决下一代网络体系结构的研究热点 .本文从体系结构的角度分析了被动网络的缺陷 ,并介绍了主动网络的基本特点 ,设计了一种主动网络体系结构框架 ,并利用代码存储和请求加载等技术实现了这种系统框架的主动网络原型系统 ANSoft.该原型系统既具备主动网络系统的基本特征 ,同时也具有自身的特点

Intrusion Detection System(IDS) is one kind of the systems which can find the true places of attackers on the network automatically exposing the common ways which attackers often use,i e. address spoofing. With the increase network attack events,it becomes a very urgent task to introduce such a real time system, which can trace the attackers accurately, into current network environment. This article introduced and studied IP packet oriented system tracing technique and pointed out the advantages and...

Intrusion Detection System(IDS) is one kind of the systems which can find the true places of attackers on the network automatically exposing the common ways which attackers often use,i e. address spoofing. With the increase network attack events,it becomes a very urgent task to introduce such a real time system, which can trace the attackers accurately, into current network environment. This article introduced and studied IP packet oriented system tracing technique and pointed out the advantages and disadvantages.

入侵追踪系统是在网络上自动发现攻击者真实位置的系统 ,可以揭穿地址欺骗等攻击者常用的手段。随着网络攻击事件的日益增多 ,开发面向当前网络环境 ,能够准确、实时追踪入侵者的系统是十分迫切的任务。对IP报文追踪技术进行介绍 ,并指出其利弊所在。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关address spoofing的内容
在知识搜索中查有关address spoofing的内容
在数字搜索中查有关address spoofing的内容
在概念知识元中查有关address spoofing的内容
在学术趋势中查有关address spoofing的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社