• 一些方法基于IP地址数据长度统计特征,这些方法IP地址欺骗攻击检测急剧下降。

    Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.

    youdao

  • 一个IPS系统可以监控异常行为发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet地址解析协议欺骗攻击

    An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.

    youdao

  • 大量攻击机器使用地址欺骗使得现有跟踪是不可能的。

    The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

    youdao

  • 利用数据链路地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击

    Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    youdao

  • 攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    youdao

  • 基于地址欺骗网络攻击成为当前网络安全主要威胁之一。

    The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.

    youdao

  • 针对常见IP地址欺骗、IP路由欺骗ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    youdao

  • 针对常见IP地址欺骗、IP路由欺骗ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定