|
关注:1
2013-05-23 12:21
求翻译:It is most effective to eliminate vulnerabilities, but if that is not possible, it is then desirable to recognize that an attack is occurring or has occurred, and take action to prevent future attacks or limit the damage from the current one. (See Figure 9-3) Intrusion detection can be either anomaly detection, which s是什么意思? 待解决
悬赏分:1
- 离问题结束还有
It is most effective to eliminate vulnerabilities, but if that is not possible, it is then desirable to recognize that an attack is occurring or has occurred, and take action to prevent future attacks or limit the damage from the current one. (See Figure 9-3) Intrusion detection can be either anomaly detection, which s
问题补充: |
|
2013-05-23 12:21:38
这是最有效的消除漏洞,但如果这是不可能的,它是那么应该承认,攻击发生或已经发生,并采取行动,以防止未来的攻击或限制从当前的损害。 (见图9-3)入侵检测可以是异常检测,旨在确定是规范,或误用检测,以确定其对敏感资源的企图影响攻击行为攻击。入侵检测系统监视计算机系统,以警告,是迫在眉睫的攻击,正在进行或已经发生。
|
|
2013-05-23 12:23:18
是最有效消除了安全漏洞,但如果不能,则需要认识到,一个则是攻击正在发生或已经发生,并且采取行动,阻止未来的攻击或限制所造成的损坏由本一个。 (请参阅图 9-3 9-3 9-3) 入侵检测可以是异常检测,要力求通过行为识别攻击,就是对这一规范,或误用检测,以确定其攻击的企图影响敏感资源。
|
|
2013-05-23 12:24:58
正在翻译,请等待...
|
|
2013-05-23 12:26:38
这是最有效的消除漏洞,但如果这是不可能的然后是可取识别攻击正在发生或已发生,并且采取行动,以防止将来攻击或限制在当前造成的危害。(请参见图 9-3)入侵检测可以异常检测,旨在确定攻击是不规范的行为,或是滥用检测的敏感资源及其企图影响识别攻击。入侵检测系统监视计算系统即将来临,正在进行之中,或已发生的攻击的警告。
|
|
2013-05-23 12:28:18
正在翻译,请等待...
|
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区