对网站进行因特网的流量攻击,直到网站停止工作并崩溃掉。
Bombardment of a website with Internet traffic, until it stops being able to cope and crashes.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
它不停的攻击使用目标网站的电脑,使流量激增,超过处理范围。
This involves bombarding computers that run the target's website with more traffic than they can handle.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
针对一系列的攻击,ModSecurity为web应用提供了强大的保护,并对HTTP流量进行监测和实时分析,这些都只是很少或是根本没有影响系统的基础设施。
ModSecurity provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.
除了提供记录日志功能外,ModSecurity还能实时的监控HTTP的流量以检测攻击。
In addition to providing logging facilities, ModSecurity can monitor the HTTP traffic in real time in order to detect attacks.
这可能意味着记录所有DNS查询-这对从钓鱼式攻击追捕可疑流量趋势也是有益的。
This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
网络流量过大、黑客攻击和一般攻击。
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
该文在安全路由协议的基础上,针对流量模式类攻击,提出一种基于数据链路监视的攻击检测机制。
This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.
在测试中,该系统能够准确回放我们产生的攻击流量与背景流量,在测试中同测试平台其他软件配合量良好。
In the test, it can replay both attack traffic and background traffic, and work well with other software in the system.
许多网络设备考虑ICMP流量是良性,对其负载部分不进行检测,因此,攻击者可以将生成的任意信息隐藏在ICMP的有效负载中。
ICMP traffic is often considered to be benign, so network equipment does not check its payload. Therefore, an attacker can hide any generated information in the payload of ICMP.
分析发现,合法流量和包含攻击包流量采样在功率谱密度上存在显著差异。
With its attacking traffic pattern, obvious difference was found between the power spectrum density (PSD) of legitimate and attack traffic samples.
被动攻击:消息内容和流量分析释放。
Passive attacks: release of message contents and traffic analysis.
被动攻击:消息内容和流量分析释放。
Passive attacks: release of message contents and traffic analysis.
应用推荐