本文提出了一种新的过滤syn洪水攻击的方法。
This paper presents a novel scheme for filtering SYN flooding attacks.
这种攻击类似于ping洪水攻击,但它能巧妙地修改进程。
This attack is similar to the ping flood attack but with a clever modification to the process.
这种漏洞使系统可能受到SYN洪水攻击而导致堆栈溢出,连接中断。
As a result, the stack may be overflowed by SYN flooding attack, which will cause the connection break off.
传统的洪水攻击(SYN洪水攻击)是用TCP协议三次握手的漏洞来实现的。
Traditional flood attack (SYN flood) makes use of the leak of TCP protocol's three times handshake.
本文提出了一个简单实用的动态检测模型用于检测SY N洪水攻击,可以实时有效和准确地检测到最为流行的SYN洪水攻击。
In this paper, we present a simply and applied dyn amic model for detecting SYN flooding attack, which is the most popular DOS attack.
由于对wikileaks.org连续进行的洪水攻击,约500 .,000家EveryDNS.net服务的网站也处在危险境地。
EveryDNS.net serves about 500, 000 websites that could be in jeopardy due to the continuous DDOS attacks on the Wikileaks site.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
ping洪水攻击是一种简单的DDoS攻击。在这种攻击中,一个计算机向另一个系统发送一个包(ping),以找到关于服务或系统的信息。
A ping flooding attack is a simple DDoS attack in which a computer sends a packet (ping) to another system with the intention of uncovering information about services or systems that are up or down.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
由于这个原因,SYN洪水也被称为半开的攻击。
For this reason, SYN floods are also known as half-open attacks.
印度城市厚重的大本营保护着哈拉帕免受洪水和攻击者的伤害,比美索不达米亚最大的金字形神塔还要大。
The massive citadels of Indus cities that protected the Harappans from floods and attackers were larger than most Mesopotamian ziggurats.
各种“洪水式”拒绝服务攻击比较容易检测,但却难于防范,因为它们是通过一种简单、自然、“正常”渠道发起的攻击。
The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.
各种“洪水式”拒绝服务攻击比较容易检测,但却难于防范,因为它们是通过一种简单、自然、“正常”渠道发起的攻击。
The kinds of "flood" denial of service attack are easy to he detected, but difficult to prevent, because they use the simple, nature, "normal" way to attack.
应用推荐