2015SA__10(Desing-2).pptVIP

  • 1
  • 0
  • 约1.77万字
  • 约 45页
  • 2017-01-02 发布于北京
  • 举报
Resisting Attacks Limit access. Firewalls restrict access based on message source or destination port. Evaluation only. Created with Aspose.Slides for .NET 3.5 Client Profile 5.2.0.0. Copyright 2004-2011 Aspose Pty Ltd. Detecting Attacks The detection of an attack is usually through an intrusion detection system(入侵检测系统). The traffic pattern is compared to historic patterns of known attacks. The packets must be filtered in order to make comparisons. Filtering can be on the basis of protocol, TCP flags, payload sizes, source or destination address, or port number. Sensor to detect attacks, m

文档评论(0)

1亿VIP精品文档

相关文档