作业帮 > 英语 > 作业

英语翻译Whenever malicious activity occurs on a network it uses

来源:学生作业帮 编辑:作业帮 分类:英语作业 时间:2024/05/10 20:37:24
英语翻译
Whenever malicious activity occurs on a network it uses a specific process or method
to execute its attack.This activity exhibits a pattern,or fingerprint,that is unique to
each individual form of attack.The pattern shows itself in various ways,such as a port
scan to a range of hosts or modified TCP packets that are distributed throughout a
victim network.A signature-based intrusion detection system is designed to detect
intrusions through the comparison of current network data against known,documented
malware patterns.The main issue when deploying a signature-based intrusion detection
system is with the use of signatures.An attacker can and will modify an existing
attack so that its new signature will differ from the original to such a point that the
IDS will no longer identify it as malicious activity.Another problem with signature-
based intrusion detection is that it can only match malicious activity with known
forms of attack.It will not be able to detect new,unknown attacks with undocumented
attack patterns.To minimize this problem constant maintenance of the signature database
is required; a potentially costly exercise in dollars as well as the network administrator
time.Also how does the network administrator react when he/she finds out
about a new threat and the subsequent patch/update has not been created?Patch creation
is a complex process,which can take a long time.Ideally this system,to have
maximum effectiveness,should match known attacks,activity that exhibits slight
variations on existing patterns,as well as be able to discriminate attacks from normal
traffic on the network.Due to the rigid nature of the signature-based IDS,organizations
are tending towards using anomaly-based intrusion detection approaches
请不要用软件直接翻译,
每当恶意活动在一网络上发生,它使用一所特有的过程或者方法执行它的对的攻击.这个活动在展示模范是每一对的攻击的个人形式所特有的或者指纹.模式在例如一港口细看的各种各样的到一大批被在整个一受害者网络分配的主人或者修改 TCP 小包的路中出现.一签名把放置在基座上打扰探查系统被设计通过对着知道,用文件证明 malware 模式的当前网络数据的和比较察觉打扰.当部署一签名把放置在基座上打扰探查系统的时候的主要问题是用签名的使用.一个攻击者能和将修改一次存在对的攻击,因此它的对是新签名将向这样一论点那伊德将不再辨认出它是恶意活动在原物上和不同.另一签名把放置在基座上打扰探查的问题是那它能仅使恶意活动和对的攻击的以而闻名形式相配.它不将能用无证明文件的对的攻击模式察觉对是新,不知名对的攻击.把这有问题的常数减到最低限度签名数据库的维持被要求;一在以及网络行政管理人员时间的美元中的潜在地对代价巨大的练习.也怎样网络行政管理人员确实通过对作出反应,当他/她了解一对是新对的威胁的情况和随后补丁程序/新的信息还没有被建立的时候吗?补丁程序创造是一能拿一长时间的复杂的过程.理想的情况是这系统将和在展示轻微的存在模式的变奏曲的以而闻名对的攻击,活动相配有最大效力以及能区分网络对的攻击和对是正常交通.由于签名的坚硬本质把放置在基座上 IDS 组织正朝向向使用不按常规把放置在基座上打扰探查是接近