This method monitors the network through reading and analyzing networks connection information in the Management Information Base contradistinguishing the networks invasion and attack characteristic.
此方案主要是通过读取和分析管理信息库中的网络连接信息,针对网络入侵和攻击的特点,来对网络进行监测。
对比的
This method monitors the network through reading and analyzing networks connection information in the Management Information Base contradistinguishing the networks invasion and attack characteristic.
此方案主要是通过读取和分析管理信息库中的网络连接信息,针对网络入侵和攻击的特点,来对网络进行监测。