• 大量攻击机器使用地址欺骗使得现有跟踪是不可能的。

    The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

    youdao

  • 基于地址欺骗网络攻击成为当前网络安全主要威胁之一。

    The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.

    youdao

  • 一些方法基于IP地址数据长度统计特征,这些方法IP地址欺骗攻击时检测急剧下降。

    Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.

    youdao

  • 针对常见IP地址欺骗、IP路由欺骗ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    youdao

  • IP地址主机名所有内容都可以欺骗

    Everything from IP addresses to hostnames, at the end of the day, can be spoofed.

    youdao

  • 因为反向域名搜索可以地址所有者确定,所以防止ip欺骗发生,必须进行第二查找

    Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.

    youdao

  • 提醒客户不要理会要求保密账户登录信息邮件记住邮件看来熟悉链接可能转递欺骗地址

    Customers are reminded to ignore emails asking for confidential account or log-in information and remember that familiar looking links in an email can redirect to a fraudulent site.

    youdao

  • 安全专家正在部署一个新的全球系统系统能鉴定互联网地址使网站伪造欺骗变得更加困难

    Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.

    youdao

  • 安全专家正在部署一个新的全球系统系统能鉴定互联网地址使网站伪造欺骗变得更加困难

    Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.

    youdao

  • 有人欺骗的电子邮件地址使看起来原来的电子邮件来自

    Someone has "spoofed" your email address, making it look like the email originally came from you.

    youdao

  • 一个IPS系统可以监控异常行为发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet地址解析协议欺骗的攻击。

    An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.

    youdao

  • 利用数据链路地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击

    Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    youdao

  • 攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    youdao

  • ARP病毒是以多种手段对帧内MAC地址进行欺骗达到非法获取他人合法信息阻断他人正常上网的目的。

    ARP virus is programmed, through deceiving with MAC address in many means, to illegally obtain the users personal information for interrupting USES from normal access to Internet.

    youdao

  • 欺骗通过修改操作系统内核页表方法使操作系统以为找到实际物理地址实际上地址不是真正的物理地址

    While page table fraud means to deceive the operating system that it has found the actual physical address, which is actually not, by modifying the page table in kernel mode.

    youdao

  • 通过IPMAC地址绑定ICMP重定向报文处理有效地ARP欺骗进行防范。

    ARP spoofing is defended effectively by binding IP and MAC or processing the ICMP redirect messages.

    youdao

  • 通过深入研究ARP协议ARP欺骗方式实现了主机MAC和IP地址绑定设计了一个可以跨越多个子网进行管理的MAC IP地址绑定软件解决方案。

    By studying the ARP protocol in depth, this paper implements a software solution for MACIP address binding based on ARP spoof, which can manage hosts from more than one subnet.

    youdao

  • 通过深入研究ARP协议ARP欺骗方式实现了主机MAC和IP地址绑定设计了一个可以跨越多个子网进行管理的MAC IP地址绑定软件解决方案。

    By studying the ARP protocol in depth, this paper implements a software solution for MACIP address binding based on ARP spoof, which can manage hosts from more than one subnet.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定