• 博客(0)
  • 资源 (7)

空空如也

加密流量分析.pdf

迅猛增长的加密流量正不断改变着威胁形势。随着越来越多的企业实现全数字化,大量的服务和应 用都采用加密技术作为确保信息安全的首要方法。更具体地说,加密流量同比增长已超过 90%,对 流量进行加密的网站数量已从 2015 年的 21% 上升到 2016 年的超过 40%。据 Gartner 预测,到 2019 年, 80% 的网站流量都会被加密。 对于使用互联网通信并在线处理业务交易的企业而言,加密技术可以为其提供更强的隐私性和安全 性。移动应用、云应用和 Web 应用依赖合理实施的加密机制,使用密钥和证书来确保安全性并建 立信任。然而,企业并不是加密技术的唯一受益者。威胁发起者也在利用这项技术躲避检测,确保 他们恶意活动能够得逞。图 1 显示了此类攻击带来的经济影响。

2020-02-23

eta-nonfab-deploy-guide-2019oct.pdf

The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using encryption as the primary method of securing information. Encrypted traffic has increased by more than 90 percent annually Encryption technology has enabled much greater privacy and security for enterprises and individuals that use the Internet to communicate and transact business online. Mobile, cloud, and web applications rely on well implemented encryption mechanisms that use keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption. Threat actors have leveraged these same benefits to evade detection and to secure their malicious activities. Traditional flow monitoring, as implemented in the Cisco® Network as a Sensor (NaaS) solution and through the use of Flexible NetFlow (FNF), provides a high-level view of network communications by reporting the addresses, ports, and byte and packet counts of a flow. In addition, intraflow metadata, or information about events that occur inside of a flow, can be collected, stored, and analyzed within a flow monitoring framework. This data is especially valuable when traffic is encrypted, because deep-packet inspection is no longer viable. This intraflow metadata, called Encrypted Traffic Analytics (ETA), is derived by using new data elements or telemetry that is independent of protocol details, such as the lengths and arrival times of packets within a flow. These data elements have the property of applying equally well to both encrypted and unencrypted flows. ETA focuses on identifying malware communications in encrypted traffic through passive monitoring, the extraction of relevant data elements, and supervised machine learning with cloud-based global visibility

2020-02-23

ARCGIS用JAVA的开发

arcgis java 实现放大,缩小,漫游,查询,显示

2012-06-19

ARCGIS二次开发 C#

ARCGIS二次开发 C# 实现的是用标注点。线。面。在地图上

2012-06-09

Linux下Shell的实现说明

1、 首先利用readline()函数读到用户输入的shell命令,采用一个数组来保存shell命令,数组有固定的大小。 2、 在main()函数中根据字符串中是否存在 "&" 字符判断是否为后台进程。如果是后台命令则判断是否是多条指令,如果不是将分割后的命令传递给pipel()函数,如果是的话分割之后利用while循环将命令传递给pipel()函数。如果不是后台进程,需要用waitpid()函数等待子进程结束后父进程才继续。 3、在pipel()函数中,将shell命令根据 "|" 字符分割成一个个重定向命令,利用fork ()得到子进程,并完成管道的设置,然后对每个重定向命令调用redirect()函数(如果没有 "|",则将整个shell命令调用redirect()函数)。 4、在redirect函数里面,根据有没有”>”,”<”来判断是否需要重定向。如果不需要重定向,就直接对参数列表调用execv(char *, char **)函数执行命令。如果需要重定向,进行相应的处理,再调用execv()函数。

2012-06-09

用C在LINUX下实现shell

用C在LINUX下实现shell.通道功能,

2012-06-09

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除