intrusion protection

[ɪnˈtruːʒn prəˈtekʃn]
  • 网络

    入侵防护;入侵防御

数据更新时间:2025-11-14 11:58:50
1、

Research and Implementation of Network Intrusion Detection and Protection Technology Based on HTTP-Flood Attack

基于HTTP-FLOOD攻击的网络入侵检测防御技术研究与实现

互联网摘选

2、

As the key technology of network content security check, string matching algorithms are wildly used in the intrusion detection, intrusion protection, network virus protection, network content monitoring and other network security systems.

作为网络内容安全检查的重要技术,字符串匹配算法被广泛的应用在入侵检测、入侵保护、网络防病毒和网络内容监控等网络安全系统中。

互联网摘选

3、

Due to the lagging response, traditional security scheme such as firewall associated with intrusion detection system can not meet the security needs, intrusion protection system appears.

传统的防火墙加入侵检测系统的安全方案,由于响应的滞后性已经不能满足目前的安全需要,入侵保护系统在这种形式下应运而生。

互联网摘选

4、

An Active Network Security System based on Decoy Intrusion Protection

一种基于诱捕型入侵防护的主动式网络安全系统

互联网摘选

5、

Firewall, intrusion detection, virus protection and other security tools have their own defects. Moreover, linkage formation is lacking in Network Intrusion Defense. That means these security tools can not be a timely and effective manner to protect the security of the host.

防火墙、入侵检测等各种安全检测手段都有各自的缺陷,并且在防御网络入侵方面没有形成联动,这些安全手段都不能及时有效地保障整个网络系统的安全。

互联网摘选

6、

An Intrusion Tolerant Protection Scheme of CA Private Key Based on Threshold ECC

基于门限ECC的容侵CA私钥保护方案

互联网摘选

7、

It is a kind of quick-operating approach which lays particular stress on technical analysis and intrusion protection.

它是一个偏重于技术分析、专注于入侵防范的快速评估方法。

互联网摘选

8、

The system integrates the anti-scanning and anti-trace, stateful packet inspection, intrusion detection and protection technology. It can resist the usual attack of net scan and DOS/ DDOS efficiently.

在这个系统中,设置了反扫描跟踪、TCP连接监控、状态检测、入侵检测与防护4道关卡,有效地抵御了常见的网络扫描与DOS/DDOS攻击。

互联网摘选

9、

Research and realization of the concentrating control system in intrusion protection is that I am responsible mainly.

笔者主要负责入侵防御中集中控制系统的研究及实现。

互联网摘选

10、

Predicting the Consequences of Seawater Intrusion and Protection Projects

海水入侵及防治工程的后效预测

互联网摘选

11、

The Study and Implementation of Action Monitoring in the Host Intrusion Protection System

主机入侵防御中行为监控技术的研究与实现

互联网摘选

12、

The Methods and Measures of Root Intrusion Protection in Subsurface Drip Irrigation

地下滴灌防根系入侵的方法和措施

互联网摘选

13、

Interaction is a new-fashioned network defense strategy, interaction model is footstone of intrusion protection system.

联动是一种新型的网络防护策略, 联动模型是入侵防御体系的基石.

互联网摘选

14、

The existing measures which protect the security of information have a firewall, intrusion detection and virus protection usually, these tools used not only raise the complexity of the system, but also reduce the system efficiency greatly.

现有的信息安全保护措施一般有防火墙、入侵检测以及病毒防护等,这些工具在使用时不但增加了系统的复杂度,还大大降低了系统的工作效率。

互联网摘选

15、

Snort function is very strong, its code of simplicity, free and portability makes Snort become is most widely used intrusion protection and detection system, and became in fact of the industry standard.

Snort系统的功能非常强大,其代码的简洁性、免费性和可移植性使得Snort成为入侵检测系统的原型系统。

互联网摘选

16、

Research on Host Intrusion Protection Based on ANN and Markov Model

基于神经网络与马尔可夫模型的主机入侵防御技术的研究

互联网摘选

17、

The key technologies includes the design of the unified security management platform, the design of distributed deploy of intrusion detection devices, the design of the interaction of intrusion detection and attack protection, and the design of intrusion detection and security auditing based on the honeypot net.

其中关键技术点包括统一安全管理平台的设计,分布式部署入侵检测设备的设计,入侵检测与攻击防护联动的设计以及基于蜜罐的入侵检测和安全审计的设计。

互联网摘选

  • 相关词组
  • 今日热词
  • 热门搜索

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈