attack vt. 1.攻击 (opp. defend)。 2.非难,抨击。 3.着手,动手,投入。 4.(疾病)侵袭。 5.【化学】腐蚀。 We will not attack unless we are attacked; if we are attacked, we will certainly counter- attack。 人不犯我,我不犯人;人若犯我,我必犯人。 attack a task 动手工作。 attack a problem 着手解决问题。 Strong acids attack metals. 强酸对金属有腐蚀作用。 be attacked with (a disease) 害(病)。 n. 1.攻击 (opp. defense), 袭击。 2.抨击。 3.【航空】迎角,冲角,攻角。 4.着手,动手。 5.发作,发病。 6.(表演或竞赛中的)主动。 A- is the best defense. 进攻是最好的防御。 an attack formation 攻击队形。 have an attack of 为…所侵袭;害,患(病)。 make an attack on 攻击。 n. -er 攻击者。
Dm can automatically extract the signatures and features without human interference . it can be used in unknown attack detection and decrease the dependence of es on the detection rule 而利用数据挖掘技术能够自动提取模式的特点进行异常检测,能够自动发现未知模式的入侵,降低了专家系统对知识库中规则的依赖性。
Two new kinds of detection - filtering mechanism are proposed in this paper . they are distributed attack detection - filtering mechanism ( dadf ) and local attack detection - filtering mechanism ( ladf ) 在此基础上,本文提出了两种新的攻击检测?过滤机制,即:分布式攻击检测?过滤( dadf )机制和针对tcp洪流攻击的本地检测?过滤( ladf )机制。
There seem to be no substantial improvement in anti - ddos research on attack preventing , detecting & retorting yet , nor did any effective or nicety method appear to predict the ddos attack in time . ddos attack detection and defending is one of the frontiers in the field of network security 但是,目前全球对ddos攻击进行防范、检测和反击的研究工作没有实质性的重大突破,没有能准确及时预测ddos攻击发生的有效方法, ddos攻击的检测与防护是当前网络安全领域的重要前沿。
Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host . when a training sample set is unlabelled and unbalanced , attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it . when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification , a weighted svm algorithm , i 针对训练样本是未标定的不均衡数据集的情况,把攻击检测问题视为一个孤立点发现或样本密度估计问题,采用了超球面上的one - classsvm算法来处理这类问题;针对有标定的不均衡数据集对于数目较少的那类样本分类错误率较高的情况,引入了加权svm算法-双v - svm算法来进行异常检测;进一步,基于1998darpa入侵检测评估数据源,把两分类svm算法推广至多分类svm算法,并做了多分类svm算法性能比较实验。
In the face of the increasingly complicated threat of network environment , this paper focuses on the study of theories and key technologies of information security operation about network adversary , operation architecture , attack detection , attack prevention , attack deception and vulnerability analysis . the purpose of the researches is to explore new methods for information security assurance so that we can have the initiative on information security 而对日益复杂网络环境威胁,本文就网络敌手模型、对抗体系、攻击检测、攻击阻断、攻击欺骗以及脆弱性分析等信息安全对抗理论和关键技术进行研究。其目的在于探索新型的信息安伞保障方法,以掌握信息安全对抗主动权。