• 网站进行因特网流量攻击直到网站停止工作崩溃掉

    Bombardment of a website with Internet traffic, until it stops being able to cope and crashes.

    youdao

  • 一旦攻击开始网站可以尝试追踪突发洪水般的流量找到计算机对此加以过滤一个复杂过程

    Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.

    youdao

  • 分布式拒绝服务攻击需要许多电脑一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。

    A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.

    youdao

  • 不停的攻击使用目标网站电脑,使流量激增超过处理范围

    This involves bombarding computers that run the target's website with more traffic than they can handle.

    youdao

  • 吞吐量测试过程中,8500e解释了发自Ixia,到6个端口的,作为DoS攻击的海量数据立即阻塞了所有流量

    During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.

    youdao

  • 僵尸网络通常用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击可以通过使流量过载的方式使网络服务器瘫痪;这种新的攻击不同

    Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.

    youdao

  • 针对一系列攻击ModSecurityweb应用提供了强大的保护HTTP流量进行监测实时分析这些都只是很少或是根本没有影响系统的基础设施

    ModSecurity provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with little or no changes to existing infrastructure.

    youdao

  • 除了提供记录日志功能外,ModSecurity还能实时监控HTTP流量检测攻击

    In addition to providing logging facilities, ModSecurity can monitor the HTTP traffic in real time in order to detect attacks.

    youdao

  • 可能意味着记录所有DNS查询-钓鱼攻击追捕可疑流量趋势也是有益的。

    This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.

    youdao

  • Akamai研究了僵尸网络网络攻击主要流量来源地。

    Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.

    youdao

  • 第一波广泛使用拒绝服务(denial-of-service)攻击当中,攻击令 Amazon.comeBay等其他网站陷于瘫痪,此类攻击利用虚假流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户不能访问网站。

    eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.

    youdao

  • 网络流量过大、黑客攻击一般攻击

    Network floods, hacks, and attacks.

    youdao

  • 基于NLANR追踪网络流量模拟攻击数据实验证实原型系统有效性。

    The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.

    youdao

  • 该文安全路由协议基础针对流量模式攻击提出一种基于数据链路监视攻击检测机制

    This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.

    youdao

  • 测试中,系统能够准确回放我们产生的攻击流量背景流量测试中测试平台其他软件配合量良好

    In the test, it can replay both attack traffic and background traffic, and work well with other software in the system.

    youdao

  • 许多网络设备考虑ICMP流量良性负载部分进行检测因此攻击可以生成任意信息隐藏ICMP的有效负载中。

    ICMP traffic is often considered to be benign, so network equipment does not check its payload. Therefore, an attacker can hide any generated information in the payload of ICMP.

    youdao

  • 分析发现合法流量包含攻击流量采样功率密度上存在显著差异

    With its attacking traffic pattern, obvious difference was found between the power spectrum density (PSD) of legitimate and attack traffic samples.

    youdao

  • 被动攻击消息内容流量分析释放

    Passive attacks: release of message contents and traffic analysis.

    youdao

  • 被动攻击消息内容流量分析释放

    Passive attacks: release of message contents and traffic analysis.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定