• 本文提出了一种新的过滤syn洪水攻击方法

    This paper presents a novel scheme for filtering SYN flooding attacks.

    youdao

  • 这种攻击类似ping洪水攻击,但它能巧妙地修改进程

    This attack is similar to the ping flood attack but with a clever modification to the process.

    youdao

  • 这种漏洞使系统可能受到SYN洪水攻击导致堆栈溢出连接中断

    As a result, the stack may be overflowed by SYN flooding attack, which will cause the connection break off.

    youdao

  • 传统洪水攻击(SYN洪水攻击)是TCP协议握手漏洞来实现的。

    Traditional flood attack (SYN flood) makes use of the leak of TCP protocol's three times handshake.

    youdao

  • 本文提出了一个简单实用的动态检测模型用于检测SY N洪水攻击,可以实时有效准确地检测到最为流行的SYN洪水攻击

    In this paper, we present a simply and applied dyn amic model for detecting SYN flooding attack, which is the most popular DOS attack.

    youdao

  • 由于对wikileaks.org连续进行洪水攻击500 .,000家EveryDNS.net服务的网站处在危险境地。

    EveryDNS.net serves about 500, 000 websites that could be in jeopardy due to the continuous DDOS attacks on the Wikileaks site.

    youdao

  • 接下来,感染病毒电脑起来形成僵尸网络”,外部控制。“僵尸网络”用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击

    Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.

    youdao

  • ping洪水攻击简单DDoS攻击这种攻击中,一个计算机一个系统发送一个(ping),找到关于服务系统信息

    A ping flooding attack is a simple DDoS attack in which a computer sends a packet (ping) to another system with the intention of uncovering information about services or systems that are up or down.

    youdao

  • 一旦攻击开始网站可以尝试追踪突发洪水般的流量找到计算机对此加以过滤一个复杂过程

    Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.

    youdao

  • 第一波广泛使用拒绝服务(denial-of-service)攻击当中,攻击令 Amazon.comeBay等其他网站陷于瘫痪,此类攻击利用虚假流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户不能访问网站。

    eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.

    youdao

  • 由于这个原因SYN洪水称为半开攻击

    For this reason, SYN floods are also known as half-open attacks.

    youdao

  • 印度城市厚重大本营保护哈拉帕免受洪水攻击的伤害,比美索不达米亚最大金字形神塔还要

    The massive citadels of Indus cities that protected the Harappans from floods and attackers were larger than most Mesopotamian ziggurats.

    youdao

  • 各种洪水拒绝服务攻击比较容易检测难于防范因为它们通过种简单自然、“正常渠道发起的攻击

    The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.

    youdao

  • 各种洪水拒绝服务攻击比较容易检测难于防范因为它们通过种简单自然、“正常渠道发起的攻击

    The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定