Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - ids
Search - ids - List
黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。-Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks.
Date : 2026-01-12 Size : 14kb User : jhp627

功能简单的IDS基于WinPcap 开发环境:WinPcap4.0.2-IDS feature simple development environment based on WinPcap: WinPcap4.0.2
Date : 2026-01-12 Size : 2.77mb User : 梁峥

基于AGLET和Snort的一个分布式入侵检测系统的移动agent部分的代码。包括aglet上移动Agent的迁移等。-An IDS based on Mobile Agent. Use Aglet platform.
Date : 2026-01-12 Size : 13kb User : mike wang

Architecture Diagram of IDS
Date : 2026-01-12 Size : 10kb User : GameOn

Module description of IDS
Date : 2026-01-12 Size : 8kb User : GameOn
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.