Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
Akamai还研究了僵尸网络和网络攻击的主要流量来源地。
The experiment on NLANR traces and simulated attack traffic prove the effectiveness of this system.
基于NLANR追踪网络流量和模拟攻击数据的实验证实了此原型系统的有效性。
In the test, it can replay both attack traffic and background traffic, and work well with other software in the system.
在测试中,该系统能够准确回放我们产生的攻击流量与背景流量,在测试中同测试平台其他软件配合量良好。
With its attacking traffic pattern, obvious difference was found between the power spectrum density (PSD) of legitimate and attack traffic samples.
分析发现,合法流量和包含攻击包流量采样在功率谱密度上存在显著差异。
A short time later, the two sundered routers would reconnect and send out their own BGP updates, upon which attack traffic would start flowing in again, causing them to disconnect once more.
短时间以后,两个被隔离的路由器会重新连接并发去其自己的边界网关协议更新信息,一旦攻击再开始,其会使它们再次断开。
The dataset evaluation methodology is a feasible and effective way to evaluate the performance of intrusion detection systems. The dataset contains background traffic and attack traffic.
利用评测数据集对入侵检测系统进行评测是目前可行并且有效的评估手段,数据集包括背景流量和攻击流量两部分。
Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process.
一旦攻击开始,网站可以尝试追踪突发洪水般的流量找到源计算机并对此加以过滤,但这是一个复杂的过程。
GWT provides a high level of obfuscation that mitigates the problem to a degree, but a secondary point of attack remains: any HTTP traffic that travels between your GWT client and its services.
GWT提供了高层次的混淆,从而可以将这个问题降低到一定程度,但是仍然存在次要攻击点:GWT客户机及其服务之间的HTTP通信量。
The pair, who had been nearby directing traffic, encountered the gunman at the Soldier Readiness Center minutes after Hasan began his attack.
两位警察当时在附近指挥交通,在哈桑开始袭击的几分钟后来到士兵准备中心与哈桑持枪对峙。
Adaptation had a similar surprise attack, but the Coen brothers are more cunning — showing traffic clear in one direction before cutting to the car barreling toward the camera.
改编剧本也有一个相似的惊人的攻击镜头,但科恩兄弟更狡猾——在切入汽车高速进入镜头前只在一个方面清晰展现交通。
He has been warned that he is putting himself at increased risk of attack when he gets stuck in traffic.
警卫人员警告他说,如果他被困在交通堵塞的车流中,受到袭击的风险会大大增加。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
During the throughput testing, the 8500e interpreted a massive amount of data sent by the Ixia over six ports as a DoS attack, and immediately blocked all traffic.
在吞吐量测试过程中,8500e解释了发自Ixia,到其6个端口的,作为DoS攻击的海量数据,并立即阻塞了所有流量。
eBay and other sites are crippled in one of the first widespread uses of the denial-of-service attack, which floods a site with so much bogus traffic that legitimate users cannot visit.
在第一波广泛使用拒绝服务(denial-of-service)攻击当中,一次攻击令 Amazon.com和eBay等其他网站陷于瘫痪,此类攻击利用虚假的流量洪水般地冲击一个网站,虚假流量如此之大致使合法用户也不能访问该网站。
As stated earlier, enabling WebSphere Application Server security causes most internal traffic to use SSL to protect it from various forms of network attack.
如前面所述,启用WebSphereApplicationServer安全性使得大多数内部传输都使用ssl来保护其不受各种形式的网络攻击。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
On the 4th day, Xuande personally led an attack on the west gate while Huang Zhong and Wei Yan went against the east; they left the north and south gates open to traffic.
攻到第四日,玄德自提一军攻打西门,令黄忠、魏延在东门攻打,留南门北门放军行走。
On the 4th day, Xuande personally led an attack on the west gate while Huang Zhong and Wei Yan went against the east; they left the north and south gates open to traffic.
攻到第四日,玄德自提一军攻打西门,令黄忠、魏延在东门攻打,留南门北门放军行走。
应用推荐