|
发表于 2010-6-8 12:13:59
|
显示全部楼层
引用第0楼bookme于2010-06-08 11:09发表的 一篇论文摘要的英文翻译校对 :
自2004年以来,僵尸网络日益受到人们的重视。一个僵尸网络控制的计算机数量众多,可以造成包括拒绝服务攻击、垃圾邮件等多种危害,整个计算机网络的安全性,保密性,完整性受到了极大的挑战。
本文针对僵尸网络及其防御技术展开研究,主要工作如下:
1、研究了网络安全现状与网络攻击的常用方法,并讨论了各种网络攻击方法的危害及其防御措施。
2、概述了僵尸网络的产生发展及僵尸网络的形成与攻击技术,分析了僵尸网络的特点及我国僵尸网络的现状。
3、分析研究僵尸网络的检测与跟踪方法,探讨了对抗僵尸网络攻击的防御策略,设计了对通过边界路由器的不同类型的IP数据包,启用动态包过滤机制,并在此基础上建立了基于相同度检测的僵尸网络防御模型。
.......
楼主是用机器翻译上面部分的吗? 感觉怪怪的,呵呵,义务帮楼主改改吧,既然见到,请笑纳;水平有限,仅仅翻译成这样咯,呵呵。
Since 2004, it has been paid increasingly attention to the Botnet. The number of computers for a Botnet are so large, and this could do harm to many aspects, including denial of service attacks, spam and other hazards; the entire computer network security, confidentiality, integrity are meeting a great challenge.
In this paper, the research of the Botnet Technology and Defense could be expanded, the major ones are as follows:
1. Doing research on network security and network status of the commonly used method of attack with discussion on a variety of network attack and defense.
2. Summarizing the development and attack techniques of the Botnet with analysis on the characteristics and status of the Botnet in China.
3. Analyzing and studying the tracking methods of the Botnet and discussing the Botnet attacks against defense strategy, which was designed through the border routers of different types of IP data packets, and enabling dynamic packet filtering mechanism, in addition, establishing inspection of the zombie based on the same network defense model.
4. Basing on the NS2 network simulation software to simulate a Botnet attack and defense, and the experiment verified the feasibility of the defense model.
|
|