入侵防护

  • 网络Intrusion Prevention;IPS
入侵防护入侵防护
  1. 考虑为任务-临界盒执行入侵防护软件。

    Consider implementing intrusion prevention software for mission-critical boxes .

  2. 网络纵深防御与入侵防护系统

    Network Defense in Depth and Intrusion Prevention System

  3. 基于ARP协议和Agent协作方法的动态入侵防护

    Dynamic Invasion Protection Based on ARP Protocol and Agent Cooperation Method

  4. 一种基于诱捕型入侵防护的主动式网络安全系统

    An Active Network Security System based on Decoy Intrusion Protection

  5. 黑客入侵防护体系研究与设计

    The Study and Design of the Defence System of the Hacker Attacks

  6. 一种新型计算机网络黑客入侵防护系统

    A New Type Computer Network Security System Against Hackers

  7. 我们提出的数据库入侵防护模型具有以下特点:(1)针对数据库应用层的入侵攻击;

    The model has following features ( 1 ) .

  8. 本文论述了数据库入侵防护技术和代理签名技术的研究成果,本文的内容分为数据库入侵防护技术的研究和代理签名技术的研究两个部分。

    The paper presents the research on database intrusion prevention and proxy signature for e_commerce .

  9. 入侵防护技术综述

    An overview of Intrusion Prevention Technique

  10. 这些工作大大提高了数据库入侵防护系统的实用性,为进一步的研究工作奠定了良好的基础。

    The impact of DIPS on database system and its intrusion detection and prevention is tested and analyzed .

  11. 本文结合入侵防护系统对以上类别分别举例做了详细的介绍。

    In this paper , intrusion prevention system is an example of the above categories and a detailed introduction .

  12. 而入侵防护是一项新的关于网络安全的技术,在网络安全领域中有举足轻重的地位。

    But intrusion prevention is a new technology about network security , and the paper introduces that intrusion tolerance loads intrusion prevention system .

  13. 入侵防护作为一种主动的安全防护手段,它的优势体现在如下两方面:首先它可以在攻击发生前主动阻断它们,它不仅可进行检测,还能在攻击造成损坏前阻断它们;

    As a new active technology Intrusion Prevention System has two distinct advantages : first it can actively block the attacks before hacker started .

  14. 此外,我们亦将零时差,如行为监测,动态翻译和代码仿真(又名主机入侵防护)功能的保护。

    There will also be zero-day protection from capabilities such as behavior monitoring , dynamic translation and emulation ( aka host intrusion prevention ) .

  15. 本文研究了数据库入侵防护系统的实现技术,测试了原型系统对数据库系统性能的影响以及原型系统在入侵防护方面的表现,并详细的分析和比较了测试结果。

    A prototype of DIPS is implemented . The impact of DIPS on database system and its intrusion detection and prevention is tested and analyzed .

  16. 网络纵深防御是实现信息保障的核心策略,入侵防护系统是当前实现网络纵深防御的主要技术。

    Defense in depth ( DiD ) is a key policy for information assurance , and intrusion prevention systems are the main techniques to implement it .

  17. 在给出诱捕型入侵防护网络安全模型的数学描述及框架结构基础上提出了该模型的具体实现方案。

    Then the network safety turns a forward-looking sexual and active protection from the passive defense . Realization project of this model is presented on the basis of the math description and frame construction .

  18. 本文的重点是给出了基于snort/bro的分布式反馈控制入侵检测防护系统,该系统弥补了当前流行的snort入侵检测系统只能检测到网络底层的入侵,对于网络高层的入侵形式无法检测的缺点。

    This paper focuses on that the distributed feedback control intrusion detection prevention system based on snort / bro is proposed , which makes up the shortcomings of snort of only detecting the invasion of the underlying network without high-levels .

  19. 变电站入侵波防护探讨

    Discussion on Protection for Invading Wave of Substation

  20. 在这个系统中,设置了反扫描跟踪、TCP连接监控、状态检测、入侵检测与防护4道关卡,有效地抵御了常见的网络扫描与DOS/DDOS攻击。

    The system integrates the anti-scanning and anti-trace , stateful packet inspection , intrusion detection and protection technology . It can resist the usual attack of net scan and DOS / DDOS efficiently .

  21. 网络信息的入侵与安全防护

    On the Invading and Safety - Defending about the Network Information

  22. 基于木马入侵的安全防护

    Safety Protection About Inbreaking of Trojan Horse

  23. 入侵响应及防护技术研究

    Research on Intrusion Response and Defense

  24. 结合实际工作,浅谈了在变电站入侵波的防护方面应当引起注意的问题。

    Based on the actual work , the noteworthy problems in invading wave protection of substation are discussed in brief .

  25. 入侵检测和防护系统已经成为部署“深度防护”安全体系结构的一种基本技术。

    Intrusion detection and prevention systems have become an essential technology in the deployment of a " defense-in-depth " security architecture .

  26. 本将课程讨论基于网络的入侵检测和防护系统的作用,以及如何最好地部署这些系统,以最大限度地提高覆盖率和收益。

    This session discusses the roles of network-based intrusion detection and prevention systems , and where these systems can be best deployed to maximize coverage and benefit .

  27. 浅谈黑客入侵及服务器安全防护论黑客问题的复杂性

    Shallowly Discusses the Hacker Invasion and The Server Safe Protection

  28. 入侵检测作为安全防护的一项重要手段,为我们提供了及时发现入侵企图、行为和结果的能力。

    Intrusion detection as an important means of safe protection offer the ability to detect intrusion attempting , behavior and result in time for us .

  29. 然而,防火墙、入侵检测等传统防护手段本质上属于消极的被动式防御,不能满足现代网络攻防的基本需求,使得防御者在信息战中十分被动。

    However , most of the traditional countermeasures against threats such as firewall and intrusion detection system are passive in nature , can not meet the basic needs of cyber-defense , which greatly handicaps the defender .

  30. 现有的信息安全保护措施一般有防火墙、入侵检测以及病毒防护等,这些工具在使用时不但增加了系统的复杂度,还大大降低了系统的工作效率。

    The existing measures which protect the security of information have a firewall , intrusion detection and virus protection usually , these tools used not only raise the complexity of the system , but also reduce the system efficiency greatly .