基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
有一种称为syn泛滥(SYN flood)的网络攻击,它使ack数据包无法返回,导致服务器用光内存空间,无法处理到来的连接。
An attack called the SYN flood ensures that the ack packet never returns so that the server runs out of room to process incoming connections.
通过数据包筛选和执行信任通信来抵御网络攻击。
To defend against network attacks through packet filtering and the enforcement of trusted communication.
深度数据包处理在一个数据流当中有多个数据包,在寻找攻击异常行为的同时,保持整个数据流的状态。
Deep packet processing has multiple packets in a data stream, while searching for the behavior of the entire data stream.
然后,利用数据包捕获机制对攻击数据进行收集、分析和记录。
Then, using packet capture mechanism to attack the data collection, analysis and recording.
泪滴攻击及其变体涉及到发送分片数据包,然后以可能危害到系统的方式将其重新组合。
The teardrop attack and its variants involve sending fragmented packets and then reassembling them in such a way that may cause harm to the system.
随机数据包标记(PPM)是对拒绝服务攻击进行IP回溯的一种实用而有效的方法。
Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.
攻击包括有一个客户端多次发送SYN数据包(同步)服务器上的每个端口,使用假的IP地址。
The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses.
主要介绍了基于以太网环境下数据包的截获的设计与实现。数据包截获的实现是防范网络黑客攻击的措施之一。
This paper, based on Ether network environment, primarily presents design and realization of data packet seize which is one of the measure against the hacker's attack.
如果用户怀疑有人在实施非法攻击,可查看日志确认,确保向上层递交的是合法的数据包。
If the user suspected some people in the implementation illegal attack, they can examine the diary confirmed and ensure the upper formation submits is the legitimate data packet.
研究人员提出了各种各样的技术以期解决该问题,但是至今为止并没有一个系统能有效的追踪到某个特定数据包的源,也不能确定攻击者的物理位置。
Techniques have been developed to resolve the problem, but, to date, no system has been presented to trace individual packets in an efficient, scalable fashion, and can not locate the attacker either.
数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。
Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.
然后,利用数据包捕获机制对攻击数据进行了收集、分析和记录。
The most important way is that the attack packet is collected to analyses and log through the packet capture mechanism.
在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
如果用户怀疑有人在实施非法攻击,可查看日志确认,确保向上层递交的是合法的数据包。
If users suspect somebody implemented illegal attack, he can check log so as guaranteeing data packets which submit upper levels are legal ones.
如果用户怀疑有人在实施非法攻击,可查看日志确认,确保向上层递交的是合法的数据包。
If users suspect somebody implemented illegal attack, he can check log so as guaranteeing data packets which submit upper levels are legal ones.
应用推荐