• 基于网络攻击这些攻击依赖于对网络数据包低层访问试图通过修改通信流或者发现这些数据包中的信息危害系统

    Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.

    youdao

  • 有一种称为syn泛滥(SYN flood)的网络攻击,它使ack数据包无法返回,导致服务器用光内存空间,无法处理到来的连接

    An attack called the SYN flood ensures that the ack packet never returns so that the server runs out of room to process incoming connections.

    youdao

  • 通过数据包筛选执行信任通信抵御网络攻击

    To defend against network attacks through packet filtering and the enforcement of trusted communication.

    youdao

  • 深度数据包处理一个数据当中多个数据包寻找攻击异常行为同时,保持整个数据流的状态。

    Deep packet processing has multiple packets in a data stream, while searching for the behavior of the entire data stream.

    youdao

  • 然后利用数据包捕获机制攻击数据进行收集分析记录

    Then, using packet capture mechanism to attack the data collection, analysis and recording.

    youdao

  • 泪滴攻击及其变体涉及到发送分片数据包然后可能危害系统方式将其重新组合。

    The teardrop attack and its variants involve sending fragmented packets and then reassembling them in such a way that may cause harm to the system.

    youdao

  • 随机数据包标记PPM拒绝服务攻击进行IP回溯一种实用有效方法

    Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.

    youdao

  • 攻击包括一个客户端多次发送SYN数据包同步服务器每个端口使用IP地址

    The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses.

    youdao

  • 主要介绍基于以太网环境数据包的截获设计实现数据包截获的实现防范网络黑客攻击措施之一

    This paper, based on Ether network environment, primarily presents design and realization of data packet seize which is one of the measure against the hacker's attack.

    youdao

  • 如果用户怀疑有人实施非法攻击查看日志确认确保上层递交合法数据包

    If the user suspected some people in the implementation illegal attack, they can examine the diary confirmed and ensure the upper formation submits is the legitimate data packet.

    youdao

  • 研究人员提出各种各样的技术以期解决问题但是至今为止并没有一个系统有效的追踪某个特定数据包的源,也不能确定攻击者的物理位置。

    Techniques have been developed to resolve the problem, but, to date, no system has been presented to trace individual packets in an efficient, scalable fashion, and can not locate the attacker either.

    youdao

  • 数据包抽样标记技术是为了应对分布式拒绝服务攻击提出的一种IP追踪技术。

    Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.

    youdao

  • 然后,利用数据包捕获机制攻击数据进行了收集分析记录

    The most important way is that the attack packet is collected to analyses and log through the packet capture mechanism.

    youdao

  • 因特网上,指一类他们故意数据包淹没网站网络,对攻击网站或网络的用户而言造成拒绝服务情景

    On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.

    youdao

  • 如果用户怀疑有人在实施非法攻击查看日志确认,确保向上层递交合法数据包

    If users suspect somebody implemented illegal attack, he can check log so as guaranteeing data packets which submit upper levels are legal ones.

    youdao

  • 如果用户怀疑有人在实施非法攻击查看日志确认,确保向上层递交合法数据包

    If users suspect somebody implemented illegal attack, he can check log so as guaranteeing data packets which submit upper levels are legal ones.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定