attack signatureの例文
- Einstein 2 will use " the minimal amount " necessary of predefined attack signatures which will come from internal, commercial and public sources.
- On the day of the hijackings ( under tremendous time pressure ), no analyst associated the multiple hijackings with the multiple-attack signature of al-Qaeda.
- The use of deep packet inspection ( DPI ) can detect, at the network perimeter, very basic remote attempts to exploit buffer overflows by use of attack signatures and payload is slightly variable.
- A method to attack signature based online banking methods is to manipulate the used software in a way, that correct transactions are shown on the screen and faked transactions are signed in the background.