Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
GWT provides a high level of obfuscation that mitigates the problem to a degree, but a secondary point of attack remains: any HTTP traffic that travels between your GWT client and its services.
GWT提供了高层次的混淆,从而可以将这个问题降低到一定程度,但是仍然存在次要攻击点:GWT客户机及其服务之间的HTTP通信量。
The pair, who had been nearby directing traffic, encountered the gunman at the Soldier Readiness Center minutes after Hasan began his attack.
两位警察当时在附近指挥交通,在哈桑开始袭击的几分钟后来到士兵准备中心与哈桑持枪对峙。
Adaptation had a similar surprise attack, but the Coen brothers are more cunning — showing traffic clear in one direction before cutting to the car barreling toward the camera.
改编剧本也有一个相似的惊人的攻击镜头,但科恩兄弟更狡猾——在切入汽车高速进入镜头前只在一个方面清晰展现交通。
He has been warned that he is putting himself at increased risk of attack when he gets stuck in traffic.
警卫人员警告他说,如果他被困在交通堵塞的车流中,受到袭击的风险会大大增加。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more.
短时间以后,两个被隔离的路由器会重新连接并发去其自己的边界网关协议更新信息,一旦攻击再开始,其会使它们再次断开。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
On the 4th day, Xuande personally led an attack on the west gate while Huang Zhong and Wei Yan went against the east; they left the north and south gates open to traffic.
攻到第四日,玄德自提一军攻打西门,令黄忠、魏延在东门攻打,留南门北门放军行走。
Eg. Remember that you or I could drop dead from a heart attack or be killed in a traffic accident tomorrow.
要知道,你我都有可能明天因心脏病发作而暴卒,或者因交通事故而丧生。
This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.
该文在安全路由协议的基础上,针对流量模式类攻击,提出一种基于数据链路监视的攻击检测机制。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
应用推荐