| 1. | Analysis on techniques of network sniffer and anti - sniffer 网络侦听的检测和反检测技术分析 |
| 2. | Application and avoid of network sniffer 网络监听的应用以及防范 |
| 3. | Research on monitoring and preventing network sniffer attacks based on ethernet network 中网络嗅探器攻击的监测与预防研究 |
| 4. | In many network security technology , network sniffer and intrusion detection is the very important and attractive technology to many computer operators 在众多的网络安全技术中,网络监听与入侵检测是非常重要且被计算机应用人员广泛关注的技术。 |
| 5. | If that request is not encrypted , a hacker could use a network sniffer to steal the passwords of users authenticating including administrative passwords ! 如果该请求没有加密,则黑客可以使用网络嗅探器来窃取用于身份验证的用户密码(包括管理密码! ) 。 |
| 6. | Basing on the pivotal technology of network sniffer and intrusion detection , the thesis researched the implementation of the lightweight intrusion detection system in windows system 本论文从分析网络监听和入侵检测中的关键技术出发,主要研究了一个基于windows的轻量级入侵检测系统的实现,该系统采用误用检测技术。 |
| 7. | Another commonly - used tool is a protocol analyzer better known as a network sniffer , such as sniffer pro or etherpeek , which is capable of capturing every piece of data on the network segment to which it is attached 另一个常用的工具是协议分析器(最好称为网络嗅探器,如sniffer pro或etherpeek ) ,它能够捕获它所连接的网段上的每块数据。 |
| 8. | According the cidf pattern , the system was divided into five fundamental modules : packet capture , network sniffer , rules disposal , data analyze and system reaction . each module mapp ed to different applications and the system function was introduced in brief 根据cidf入侵检测模型,将系统分为五个基本模块:数据捕获、网络监听、规则处理、数据分析和系统响应模块,分别对应于不同的应用功能;并对目前开发的系统功能做了简单的介绍。 |