端口扫描

  • 网络port scanning;Port scan;port scanner;portscan
端口扫描端口扫描
  1. 基于多线程TCP端口扫描的实现与应用

    Implementation and Application of TCP Port Scanning Based on Multithreads

  2. 端口扫描和OS扫描检测方法及入侵预警系统的研究

    Study on Detection Methods against Port Scanning and Os Scaning and on Intrusion Pre - caution System

  3. 反射式TCP端口扫描技术的研究

    Research on Technology of Reflecting TCP Port Scan

  4. 半连接端口扫描的TCP层技术研究

    Research on a Port Scanner Based on Half-connection

  5. 然后介绍了几种常见的端口扫描工具以及网络安全扫描软件:Safety。

    Then several common port scanner tools and one special network security scanner tool ″ Safety ″, which were developed by us , be introduced .

  6. TCPSYN端口扫描的研究

    A study of TCP SYN port scanning

  7. SYN探测借鉴了TCP端口扫描原理,通过发送SYN包来测试主机、TCP端口状态;

    SYN-probe detects the states of host and port by sending SYN packet like port scanning model .

  8. 这种改进方案不仅能有效防御常规的端口扫描,也能有效防御SYN隐蔽扫描。

    The improved strategy can defense both common port-scanning and the secret scanning with the symbol of SYN .

  9. 最后,给出的端口扫描、嗅探器和IP欺骗防御代理设计,说明了如何进行标准化的代理设计满足模型目标。

    Lastly , three defensive agents , which are port-scanning agent , sniffer agent and IP spoofing agent are designed in detail in order to explain how to conduct a standardized agent to meet our model objective .

  10. 第二部分介绍相关技术基础,主要讨论了DDoS原理和实现DDoS自动传播执行所需具备的相关技术,包括端口扫描技术、远程入侵技术、后门技术,以及TCP/IP协议应用中的原始套接字。

    The second part is interrelated technology about D-Gun , including DDoS principium , ports-scan , buffer overflow attack , backdoor and raw socket .

  11. 全文对TCP建立连接的原理,WINSOCK原理,端口扫描技术的基本原理和扫描方式都进行了比较详细的介绍。

    The full text explain in detail with principle of the TCP connection , principle of the WINSOCK , the basic principle of the port scan and the scan method .

  12. 目前针对这些攻击的入侵检测系统普遍通过字符串匹配方法检测入侵行为,如果匹配成功则输出报警信息,这种检测方式简单、速度高,能有效检测大多数端口扫描攻击和Web试探攻击。

    Most of current Intrusion Detection Systems for these attacks adopts the method of string match to find relevant strings , if marched then output alerts . These rules of string match establishs easily and detects fast , it can detect most of port scans and penetrations efficiently .

  13. 通过实验发现,网络中的错误标志位报文、端口扫描以及DOS攻击产生的异常流量将占到总流量的10%以上。

    Experimental results show that the quantity of anomalies generated by packets with malformed flag , port scans and DOS attacks will occupy more than 10 percent of the total traffic in networks .

  14. 介绍了网络安全的有关扫描技术,重点介绍了端口扫描技术和漏洞扫描技术及原理,分析了各类端口扫描技术和部分技术的实现以及漏洞扫描各种技术的实现。CC类;

    This paper introduces some relevant scanning techniques for network security , focusing on the port scanning technique and the vulnerability scanning technique and their principles , and analyzes on the realization of each kind of port scanning technique and vulnerability scanning technique .

  15. 端口扫描是获取远程系统TCP报文前期的一种重要活动,通过对端口扫描原理和三种确定操作系统类型方法的分析,阐明了基于TCP的远程操作系统探测技术的可用性。

    In these actions , scanning ports is an important action prior to gather the TCP diagrams . By introducing the technique scanning ports and three methods of determining the OS type from TCP , it presents the usability of the technique probing the remote OS based on TCP .

  16. Labrea是一个“粘蜜罐”,可以限定蠕虫和端口扫描攻击,从而消除它们的影响。

    Labrea is a honeypot that can tarpit worms and port scanners , thereby nullifying their effect .

  17. 要注意的是,某些组织不赞成使用端口扫描工具,如nmap:在使用工具之前请获取组织的批准。

    Be aware that some organizations frown on the use of port scanning tools such as nmap : make sure that your organization approves before using it .

  18. 针对传统抗扫描攻击设计中将抗端口扫描和抗地址扫描进行区别对待,从而造成检测效率低下、较多消耗系统资源的问题,本文设计了一种综合抗扫描攻击的方案:scanProtect。

    Design of the traditional anti-scan attack against port scan and address scan was independent , resulting in low detection efficiency and more consumption of the system resources . This paper designed an integrated program against scan : scanProtect .

  19. 网络端口扫描及其防御技术研究

    Research about technology of port scan and port scan detect

  20. 该设置还提供端口扫描和密码设置保护。

    This setting also provides port scan and password-setting protections .

  21. 基于加权关联规则的端口扫描检测

    The Application of Weighted Association Rules in Port Scanner Detection

  22. 端口扫描技术及攻击和防御分析

    Port Scanning Techniques and Analysis of Attack and Defense

  23. 构成安全威胁的几种端口扫描技术

    Several Techniques with Security Threats Used in Port Scan

  24. 网络典型端口扫描攻击的分析与完善

    Analysis and Perfection of Typical Port Network Scan Attacks

  25. VC++6.0多线程技术在端口扫描程序中的应用

    VC + + 6.0 multi-thread technology and it 's application in port scan programming

  26. 进行扫描的方法很多,可以是手工进行扫描,也可以用端口扫描软件进行。

    There is many scan ways , like manual or automatic by scan software .

  27. 网络端口扫描与漏洞检测的研究

    Study of Network Port Scanning & Leak Detection

  28. 隐蔽端口扫描的原理及防御方法

    The principle and defense of stealthy port scanning

  29. 端口扫描也是黑客搜集目标主机信息的一种常用方法。

    Ports scan also is the common way to search target computer by hackers .

  30. 对目标计算机进行端口扫描,能得到许多有用的信息。

    It may get a lots of useful information by scan target computer 's ports .