• In view of the demand that distributed attack detection needs massive data, this paper puts forward a cooperative detection model based on component structure.

    本文针对检测分布式入侵时海量数据分析应用需求,提出一种基于组件结构的协同检测模型

    youdao

  • A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.

    分布式拒绝服务攻击需要许多电脑一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。

    youdao

  • Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.

    利用分布式拒绝服务DDoS攻击,激进黑客使用僵尸网络服务器请求淹没目标网站的方式,网站无法访问

    youdao

  • Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.

    Krebs onSecurity报告称,只需几百美元地下论坛上个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。

    youdao

  • To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).

    实现这些目标攻击可能实施传统DoS分布式拒绝服务(DDoS)攻击

    youdao

  • They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.

    他们首先尝试DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。

    youdao

  • But in most cases, what's really being referred to is a distributed DoS attack.

    但是大多数情况下实际涉及分布式DoS攻击

    youdao

  • Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.

    僵尸网络通常用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击可以通过使流量过载的方式使网络服务器瘫痪;这种新的攻击不同。

    youdao

  • A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.

    文中设计出了一个分布式网络攻击测试系统模块化的体系结构使系统具有良好可扩展性

    youdao

  • To solve the primary user emulation attack and selfish misbehaviors in cognitive radio networks, this paper presents cluster-based security architecture for distributed cognitive radio networks.

    针对认知无线电网络出现的模仿用户攻击自私行为攻击问题,提出一种基于簇分布式认知无线电网络安全体系结构

    youdao

  • In all-optical networks, distributed algorithms for attack localization was analyzed, and an all-optical network simulation platform was constructed for attack localization and resumption.

    分析了网络分布式攻击定位算法构建了全光网络攻击定位恢复仿真平台

    youdao

  • Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.

    信息战现代战争重要作战样式,网络战是信息战的重要组成部分分布式网络化计算机系统信息作战实施攻击防护首要作战目标

    youdao

  • A member of that group pleaded guilty in US federal court earlier this year to a hacking charge for his role in a distributed denial-of-service attack that brought down church websites in 2008.

    一名组织成员今年早些时候美国联邦法院服罪,罪名是黑客犯罪使用分布式拒绝服务攻击在2008年使该教会网站瘫痪。

    youdao

  • IP traceback is an important way to defend against distributed denial of service attack.

    IP追踪防御分布式拒绝服务攻击重要方法

    youdao

  • We outline a distributed strategy to tackle the history-revision attack threat in a simple and elegant way.

    我们采取了分散策略,利用一个简单合理的方式处理历史攻击威胁

    youdao

  • Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.

    安全性硬件级别上实现故障安全性的隔离平台内置arp攻击防护能力,分布式规模化提升ddos攻击能力。

    youdao

  • Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.

    安全性硬件级别上实现故障安全性的隔离平台内置arp攻击防护能力,分布式规模化提升ddos攻击能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定