bounce attack meaning in Chinese
反弹攻击
Examples
- We use uml to describe the whole system architecture , and use colored petri nets to describe intrusions and specify agent design . at last , we build a prototype of this model on java platform . this prototype running in linux / windows environments , and can detect ftp bounce attack
在本系统建模阶段,结合了uml建模语言和有色petri网技术,将uml语言用于整个检测系统的动态和静态建模,而利用有色petri网进行分布式入侵模式的分析,并在此基础上针对不同的入侵模式构建相应的检测agent 。