一篇论文摘要的英文翻译校对
自2004年以来,僵尸网络日益受到人们的重视。一个僵尸网络控制的计算机数量众多,可以造成包括拒绝服务攻击、垃圾邮件等多种危害,整个计算机网络的安全性,保密性,完整性受到了极大的挑战。本文针对僵尸网络及其防御技术展开研究,主要工作如下:
1、研究了网络安全现状与网络攻击的常用方法,并讨论了各种网络攻击方法的危害及其防御措施。
2、概述了僵尸网络的产生发展及僵尸网络的形成与攻击技术,分析了僵尸网络的特点及我国僵尸网络的现状。
3、分析研究僵尸网络的检测与跟踪方法,探讨了对抗僵尸网络攻击的防御策略,设计了对通过边界路由器的不同类型的IP数据包,启用动态包过滤机制,并在此基础上建立了基于相同度检测的僵尸网络防御模型。
4、基于NS2网络仿真软件模拟僵尸网络的攻击及防御,仿真实验验证了防御模型的可行性。
Since 2004, it has been paid increasingly attention of botnets. The control of a Botnet’s number can be caused by, including denial of service attacks, spam and other hazards, the entire computer network security, confidentiality, integrity has been a great challenge.
In this paper,the research of Botnet Technology and Defenses has been expanded,major ones are as follows:
1. Research on network security and network status of the commonly used method of attack, and a variety of network attack and defense against the discussed.
2. Summarized the development and attack techniques of botnet, the characteristics and status of of botnets in China.
3. Analyzed and studied the tracking methods of botnets,discussed botnet attacks against defense strategy was designed through the border routers of different types of IP data packets, enable dynamic packet filtering mechanism, and on this basis is established Inspection of the zombie based on the same network defense model.
4. By NS2 network simulation software to simulate a botnet attack and defense,the experiment verified the feasibility of the defense model.
以上是论文摘要部分,希望高手帮忙校对,修改英文翻译部分,谢谢你的关注!!因为要的急,希望明早前获得您的帮助,再次感谢!! 引用第0楼bookme于2010-06-08 11:09发表的 一篇论文摘要的英文翻译校对 :
自2004年以来,僵尸网络日益受到人们的重视。一个僵尸网络控制的计算机数量众多,可以造成包括拒绝服务攻击、垃圾邮件等多种危害,整个计算机网络的安全性,保密性,完整性受到了极大的挑战。
本文针对僵尸网络及其防御技术展开研究,主要工作如下:
1、研究了网络安全现状与网络攻击的常用方法,并讨论了各种网络攻击方法的危害及其防御措施。
2、概述了僵尸网络的产生发展及僵尸网络的形成与攻击技术,分析了僵尸网络的特点及我国僵尸网络的现状。
3、分析研究僵尸网络的检测与跟踪方法,探讨了对抗僵尸网络攻击的防御策略,设计了对通过边界路由器的不同类型的IP数据包,启用动态包过滤机制,并在此基础上建立了基于相同度检测的僵尸网络防御模型。
.......
楼主是用机器翻译上面部分的吗? 感觉怪怪的,呵呵,义务帮楼主改改吧,既然见到,请笑纳;水平有限,仅仅翻译成这样咯,呵呵。
Since 2004, it has been paid increasingly attention to the Botnet. The number of computers for a Botnet are so large, and this could do harm to many aspects, including denial of service attacks, spam and other hazards; the entire computer network security, confidentiality, integrity are meeting a great challenge.
In this paper, the research of the Botnet Technology and Defense could be expanded, the major ones are as follows:
1. Doing research on network security and network status of the commonly used method of attack with discussion on a variety of network attack and defense.
2. Summarizing the development and attack techniques of the Botnet with analysis on the characteristics and status of the Botnet in China.
3. Analyzing and studying the tracking methods of the Botnet and discussing the Botnet attacks against defense strategy, which was designed through the border routers of different types of IP data packets, and enabling dynamic packet filtering mechanism, in addition, establishing inspection of the zombie based on the same network defense model.
4. Basing on the NS2 network simulation software to simulate a Botnet attack and defense, and the experiment verified the feasibility of the defense model.
一开头就错得离谱:Since 2004, it has been paid increasingly attention to the Botnet. 句子It指的是什么呢? 俺也不知道。。。 我只改语法。。。哈哈。。。 谢谢回应呀!希望高手再把把脉,不胜感激! 引用第2楼topwaybest于2010-06-08 12:37发表的 :
一开头就错得离谱:Since 2004, it has been paid increasingly attention to the Botnet. 句子It指的是什么呢?
似乎下面说法更通俗,也避免了语法错误(increasingly attention ——adv. + n.):
Since 2004, more and more attention has been paid to the Botnet. 引用第5楼brianleeeee于2010-06-09 01:24发表的 :
似乎下面说法更通俗,也避免了语法错误(increasingly attention ——adv. + n.):
Since 2004, more and more attention has been paid to the Botnet.
嘿嘿,版主出手了。。。 引用第5楼brianleeeee于2010-06-09 01:24发表的 :
似乎下面说法更通俗,也避免了语法错误(increasingly attention ——adv. + n.):
Since 2004, more and more attention has been paid to the Botnet.
改得好。原译的关键语法错误还不在于"increasingly attention ——adv. + n.”,而在于1、It指代不明;2、由It鸠占雀巢而引起动词pay的宾语attention在被动语态中依然被置于宾语而不是主语的位置。 Ever since 2004, more and more attention has been drawn to botnets, which could be designed to control a number of computers and used by an attacker for such malicious activities as carrying out Distributed Denial of Service (DDoS) attacks and/or sending out millions of spam e-mails, and present serious challenges to the security, confidentiality and integrity of the whole computer network.
页:
[1]