...
首页> 外文期刊>InfoWorld >INSPECTING THE INSPECTORS
【24h】

INSPECTING THE INSPECTORS

机译:检查检查员

获取原文
获取原文并翻译 | 示例

摘要

Just a few short years ago, an ids was a luxury. Before the rise of the web appli- cation and the worm, most networks were adequately defended by a firewall at the perimeter and a virus scanner at the mail server. Today, the firewall remains effective against clumsy DoS attacks and run-of-the-mill exploits, but it's hard-pressed to thwart application-layer attacks that piggyback on welcome protocols and worms that wind their way inside the network through any overlooked port or a mobile user's laptop. Not only are perimeter defenses less adequate than they used to be, but internal network resources — including business-critical applications exposed to the Web — are more valuable to their companies than ever. Naturally, the double whammy of a hole-ridden perimeter and an invaluable core has network managers looking for an edge. The IDS is becoming part of the standard toolkit.
机译:就在短短几年前,身份证是一种奢侈。在Web应用程序和蠕虫病毒兴起之前,大多数网络都受到外围防火墙和邮件服务器病毒扫描程序的充分防御。如今,防火墙仍然可以有效地抵抗笨拙的DoS攻击和常规攻击,但很难阻止应用层攻击,这些攻击依赖于受欢迎的协议和蠕虫,这些蠕虫通过任何被忽略的端口或端口将病毒绕入网络移动用户的笔记本电脑。外围防御不仅比以前不足,而且内部网络资源(包括暴露于Web的关键业务应用程序)对他们的公司比以往任何时候都更有价值。自然地,漏洞缠身的周界和无价之宝的双重打击使网络管理者寻找优势。 IDS正在成为标准工具箱的一部分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号