它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
最后,本文对系统模型应用于网络拒绝服务攻击环境的实例进行了分析,并提出了一种应用聚类分析对系统的改进方法。
Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
第一条规定按照“合理网络管理”的精神,禁止运营商屏蔽合法通讯(一个例外是要确保垃圾邮件或者拒绝服务的攻击行为能被阻止)。
One prevents network operators from blocking lawful traffic, subject to "reasonable network management" (an exception needed to ensure that spam or denial-of-service attacks can be stopped).
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
我将随意将它们分为四类:故障、不受服务提供者直接控制的网络问题、拒绝服务和预订的维护。
I'll arbitrarily divide them into four areas: failures, network issues not within the direct control of service provider, denial of service, and scheduled maintenance.
由于过多的使用数据服务,各种品牌各种型号的手机在AT&T又老又慢的EDGE网络中常常被拒绝服务,或者完全关闭其蜂窝网络。
With so much data usage, phones of all varieties are frequently forced back to AT&T’s older and slower EDGE network, or are forced off the cellular network altogether.
第二个软目标指定异常,例如计划的故障、拒绝服务、计划的维护、网络中断和服务提供商控制内的网络问题。
The second soft goal specifies exceptions, such as planned failures, denial of service, scheduled maintenance, network outages, and network issues within the control of a service provider.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
Cisco已经被警告,在InternetOperatingSystem软件中具有三个可能引发拒绝服务,运行任意代码和系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."
Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
网桥可以拒绝服务并且丢弃数据包,以阻止未授权设备对网络的访问。
Bridge may deny service and discard frames to prevent network access by unauthorized devices.
与其他算法相比,该算法能有效对抗来自网络的恶意授权实体的拒绝服务攻击。
Compared with other algorithms, the algorithm can effectively fight the denial of service attacks from malicious authorized entities in the networks.
分类:安全,网络犯罪,黑客,IT管理,拒绝服务攻击。
Category: Security, Cybercrime, Hacking, it Management, Denial of Service.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
由于无线传感器网络通常工作在无人值守的环境中,因此容易遭受到各种拒绝服务攻击。
Due to working in unattended environments, wireless sensor network is vulnerable to a variety of denial of service attacks.
在因特网上,包猴是指一类人,他们故意用数据包淹没网站或网络,对受攻击的网站或网络的用户而言,造成拒绝服务的情景。
On the Internet, a packet monkey is someone who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
本文在阐述拒绝服务攻击基本概念的基础上,分析并探讨了网络负载均衡技术在网络抗拒绝服务中的应用。
The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.
拒绝服务攻击是攻击网络系统的一种常用方法。
分布式拒绝服务攻击的出现已经使分布式入侵检测逐渐成为入侵检测乃至整个网络安全领域的又一研究重点之一。
The emergence of the DDoS (Distributed Denial of Service), which has made DID (Distributed intrusion detection) an important research point of the intrusion detection and the whole network safety.
拒绝服务攻击由于容易实施、难于防范、难以追踪,成为最难解决的网络安全问题之一。
Denial of service attack is among the hardest security problems to address because it is easy to launch, difficult to defend and trace.
如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。
How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.
如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。
How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability.
应用推荐