ID | 原文 | 译文 |
3223 | 仿真结果表明,所提方法较传统方法可降低 30%以上的网络延时并可节约 20%以上的网络成本,极大提高了各类海事应用的用户体验。 | Simulation results show that compared with conventional methods, the proposed methods save over 30% network delay and reduces about20% network costs, which can greatly enhance the maritime user experiences. |
3224 | DNS 隐蔽信道是网络安全中不容忽视的重要安全问题。 | DNS covert channel is an important security issue that cannot be ignored in network security. |
3225 | 利用 DNS 访问服务器的操作广泛存在于传统 PC、智能手机及新型基础设施的联网通信中,防火墙等基础防御设施一般不会对 DNS 数据进行过多过滤。 | The operation ofusing DNS to access the server is widely used in the network communication of traditional PC, smart phones and new in-frastructure. Basic defense facilities such as firewalls generally do not filter DNS data too much. |
3226 | 泛在性、隐蔽性使其成为攻击者手中较理想的秘密信道,因此关注已有研究成果及发展趋势都十分必要。 | The ubiquity and conceal-ment make it an ideal secret channel for attackers. It is necessary to pay attention to the existing research results and devel-opment trends. |
3227 | 首先,将 DNS隐蔽信道的发展历程概括为 3 个发展阶段,并分析各个阶段的情况。 | The development process was summarized into three stages, and the situation of each stage was analyzed. |
3228 | 然后,对其进行形式化定义,深入剖析构建机理, | Formally it was defined and the construction mechanism was deeply analyzed. |
3229 | 并对其存在的不可绕过的异常点进行分析归纳,总结检测方法并将其分为传统检测方式、人工智能赋能的检测方式,提出现存问题。 | The existing abnormal points that cannot be bypassed were analyzed and summarized, the detection methods were summarized and divided into traditional detectionmethods and artificial intelligence-powered detection methods, the existing problems were raised. |
3230 | 最后,总结当前 DNS 隐蔽信道的主要研究方向,并对其未来的发展趋势进行展望。 | Finally, The main research direction of the current was summarized, and its future development trend was prospected. |
3231 | 拟态防御是一种基于动态异构冗余架构的新型主动防御技术,具有内在不确定、异构、冗余及负反馈等特性,从而能显著提高系统稳健性和安全性。 | Mimic defense is the new active defense technology based on the dynamic heterogeneous redundant architec-ture. With inherent uncertainty, heterogeneous, redundant and negative feedback features, it can significantly improve the robustness and security of system. |
3232 | 其中多执行体调度算法是拟态防御技术的关键,其优劣直接影响拟态系统抵抗基于已知或未知漏洞后门攻击的能力。 | Among them, the scheduling algorithm is the key to mimic defense technology, which advantages and disadvantages directly affect the ability of system to resist attacks based on known or unknown vulnera-bilities. |