大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
基于源地址欺骗的网络攻击已成为当前网络安全最主要的威胁之一。
The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.
另一些方法基于IP地址和数据报长度的统计特征,但这些方法在IP地址欺骗攻击时检测率急剧下降。
Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
从IP地址到主机名,所有内容都是可以欺骗的。
Everything from IP addresses to hostnames, at the end of the day, can be spoofed.
因为反向域名搜索可以由地址块所有者确定,所以要防止ip欺骗的发生,必须进行第二次查找。
Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.
提醒客户不要理会要求保密账户或登录信息的邮件,并记住邮件中看来熟悉的链接可能转递到欺骗性的地址。
Customers are reminded to ignore emails asking for confidential account or log-in information and remember that familiar looking links in an email can redirect to a fraudulent site.
安全专家正在部署一个新的全球系统,该系统能鉴定互联网地址,使网站伪造或欺骗变得更加困难。
Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.
安全专家正在部署一个新的全球系统,该系统能鉴定互联网地址,使网站伪造或欺骗变得更加困难。
Security experts are deploying a new worldwide system to identify Internet addresses that will make it very difficult to forge or spoof a Web site.
有人“欺骗”您的电子邮件地址,使它看起来像原来的电子邮件来自你。
Someone has "spoofed" your email address, making it look like the email originally came from you.
一个IPS系统可以监控异常的行为,发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet和地址解析协议欺骗的攻击。
An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.
利用数据链路层地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击。
Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
ARP病毒是以多种手段对帧内MAC地址进行欺骗,达到非法获取他人合法信息,阻断他人正常上网的目的。
ARP virus is programmed, through deceiving with MAC address in many means, to illegally obtain the users personal information for interrupting USES from normal access to Internet.
页表欺骗是通过修改操作系统内核态页表的方法使操作系统以为找到了实际的物理地址,实际上该地址不是真正的物理地址。
While page table fraud means to deceive the operating system that it has found the actual physical address, which is actually not, by modifying the page table in kernel mode.
通过对IP与MAC地址的绑定和对ICMP重定向报文的处理,有效地对ARP欺骗进行防范。
ARP spoofing is defended effectively by binding IP and MAC or processing the ICMP redirect messages.
通过深入研究ARP协议,以ARP欺骗方式实现了主机MAC和IP地址的绑定,并设计了一个可以跨越多个子网进行管理的MAC IP地址绑定软件解决方案。
By studying the ARP protocol in depth, this paper implements a software solution for MACIP address binding based on ARP spoof, which can manage hosts from more than one subnet.
通过深入研究ARP协议,以ARP欺骗方式实现了主机MAC和IP地址的绑定,并设计了一个可以跨越多个子网进行管理的MAC IP地址绑定软件解决方案。
By studying the ARP protocol in depth, this paper implements a software solution for MACIP address binding based on ARP spoof, which can manage hosts from more than one subnet.
应用推荐