助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   漏洞扫描系统 的翻译结果: 查询用时:0.019秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

漏洞扫描系统
相关语句
  vulnerability scanning system
     The Research and Design of Network Vulnerability Scanning System
     网络漏洞扫描系统的研究与设计
短句来源
     In the end, this article describes the design and implementation of a network vulnerability scanning system, which names NVS (Network Vulnerability Scanner).
     最后本文设计并实现了一个采用木马体系结构的、面向攻击的网络漏洞扫描系统NVS(Network Vulnerability Scanner)。
短句来源
     Design and Implementation of Agent-based Network Vulnerability Scanning System
     基于Agent的网络漏洞扫描系统的设计与实现
短句来源
     Theory and realization of vulnerability scanning system for unix host
     Unix主机漏洞扫描系统的原理与实现
短句来源
     Design of Distributed Vulnerability Scanning System
     分布式漏洞扫描系统的设计
短句来源
更多       
  vulnerabilities scanning system
     Design and Implementation of Network Vulnerabilities Scanning System
     网络漏洞扫描系统的设计及实现
短句来源
  vulnerability scanners
     Function Analysis and CIM Modeling of Network Vulnerability Scanners
     网络漏洞扫描系统的功能分析与CIM建模
短句来源
     In security defense measures, the author advances a dynamic defense system, the core of which is Intrusion Detection System, namely the linkage with Intrusion Detection System, Vulnerability Scanners System and Firewalls System.
     在解决方案设计中,从风险评估、安全防护、日常维护及应急响应这四方面实施安全技术防护。 安全防护措施中提出了以入侵检测为核心的动态防御体系,即入侵检测系统与漏洞扫描系统和防火墙系统的联动,同时,建立了日常安全维护体系和应急响应体系及风险评估机制。
短句来源
     Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.
     2.在分析和归纳网络漏洞扫描系统功能的基础上,构建了其对应的CIM通用模型。
短句来源
     The achievement of the dissertation has been used in some headquarters' project, which solved the problems of network vulnerability scanners' management information modeling and integrated management well.
     论文的研究成果已在某总部的工程项目中得到应用,解决了网络漏洞扫描系统的管理信息建模及其综合管理问题。
短句来源
  “漏洞扫描系统”译为未确定词的双语例句
     1. Analyzing current network securing scanning technology, and describe its strategy and methodology in deep.
     (1)、深入地研究了安全漏洞扫描技术,并对其扫描策略和扫描方法进行了详细地分析,为设计安全漏洞扫描系统打下基础。
短句来源
     The Design of Network Security Scan System
     网络漏洞扫描系统的设计
短句来源
     Distributed Vulnerability Scanner Design Based on Electronic Government Affair Network Platform
     基于电子政务网络平台的分布式漏洞扫描系统的设计
短句来源
     Design and Implementation of Web-based Network Vulnerabilities Scan System
     基于Web的漏洞扫描系统的设计与实现
短句来源
     Based on the model, the network vulnerability scanner security management system was designed and realized.
     并以该模型为基础,对网络漏洞扫描系统的安全管理系统进行了设计与实现。 本文的主要工作包括:
短句来源
更多       
查询“漏洞扫描系统”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  vulnerability scanners
Current vulnerability scanners are unlikely to identify these vulnerabilities at all unless the kernel version is known to be vulnerable.
      
Compromised hosts can be detected with vulnerability scanners and with an intelligent analysis of network traffic.
      
For example, the tool vendors create vulnerability scanners that are driven by their own vulnerability databases.
      
Most vulnerability scanners use a set of vulnerability signatures in order to test whether a product is vulnerable to a known vulnerability.
      
Note that these recommendations do not apply to purely passive vulnerability scanners.
      
更多          


This paper mainly discusses the design and development of a scanning s ystem for checking vulnerabilities on a Host computer that provides services via Internet. With the analysis of hackers' behaviors and typical attacks, generali zes the inevitability of the existence of security vulnerabilities and summarize s the general condition about network security. Then this paper describes the co ncept, category and limitation of the technique of scanning vulnerability, and a nalyzes the significance and inevitability...

This paper mainly discusses the design and development of a scanning s ystem for checking vulnerabilities on a Host computer that provides services via Internet. With the analysis of hackers' behaviors and typical attacks, generali zes the inevitability of the existence of security vulnerabilities and summarize s the general condition about network security. Then this paper describes the co ncept, category and limitation of the technique of scanning vulnerability, and a nalyzes the significance and inevitability of adopting this technique. This pape r puts the stress on how the scanning system was designed and implemented, inclu ding the design of the system structure, the design and development of internal and external scanning module, and the design of the vulnerability database and r ules database. At last, this paper presents some shortages of this system and pr oposes some advice to extend and perfect the system. 

本文围绕网络主机漏洞扫描系统的设计和实现展开讨论。通过对黑客行为和典型攻击的分析,阐明了网络安全漏洞存在的必然原因,综述了计算机网络安全的现状。研究了漏洞扫描技术的具体概念,分类和局限性,阐明采用漏洞扫描技术的必要性。本文的重心在主机漏洞扫描系统的设计和实现上,包括系统结构的设计和实现,外部扫描模块和内部扫描模块的设计实现,以及漏洞库和规则库的的设计。最后提出了该系统还存在的不足以及需要进一步完善和扩展的设想。

The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility. A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology. This system uses the C/S structure, a scanning procedure is running at the server independently as a plug-in and the number of plug-in can...

The network security vulnerability scanning should focus sufficiently on running efficiency and independent functionality expansibility. A classification of system security vulnerability is presented based on network attack at first, and then a designing of security vulnerability scanning system is described based on the vulnerability classification and plug-in technology. This system uses the C/S structure, a scanning procedure is running at the server independently as a plug-in and the number of plug-in can be increased or reduced conveniently, and the scanning functionality option at the client depends on the vulnerability classification. The C/S communication security is supported by the certificate authentication mechanism.

网络安全漏洞扫描应充分考虑执行效率和功能独立扩展问题。从网络攻击的角度提出一个系统安全漏洞的分类,阐述了一个实用的基于这些漏洞分类以及插件技术的网络安全漏洞扫描系统的设计。该系统采用C/S模型结构,服务器端的扫描程序以独立的插件形式执行,可方便地添加或删除,而客户端漏洞的扫描功能设置则基于漏洞的分类。系统采用证书认证机制来保障C/S交互的安全性。

This paper analyzes the importance of network vulnerabilities scanner in the field of network security and its principles of implementation.The strong points of free network vulnerabilities scanner Nessus outgoing other products are presented.Also,the design and implementation of Web-based network vulnerabilities scan system based-on Nessus are given.

分析了网络漏洞扫描器在网络安全领域的重要作用及其工作原理,介绍了漏洞扫描器开源软件Nessus的优点,介绍了一个在Nessus的基础上开发的基于Web的网络漏洞扫描系统的设计与实现。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关漏洞扫描系统的内容
在知识搜索中查有关漏洞扫描系统的内容
在数字搜索中查有关漏洞扫描系统的内容
在概念知识元中查有关漏洞扫描系统的内容
在学术趋势中查有关漏洞扫描系统的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社