另一些方法基于IP地址和数据报长度的统计特征,但这些方法在IP地址欺骗攻击时检测率急剧下降。
Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.
一个IPS系统可以监控异常的行为,发现非常隐蔽的基于HTTP的攻击,以及来自远程调用过程、Telnet和地址解析协议欺骗的攻击。
An IPS monitors for behavior anomalies that indicate hard-to-spot HTTP-based attacks and those from remote-call-procedure, Telnet- and address-resolution-protocol spoofing, among others.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
利用数据链路层地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击。
Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
基于源地址欺骗的网络攻击已成为当前网络安全最主要的威胁之一。
The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
应用推荐