• The Gartner Group however estimates that 75% of attacks are at the web application layer, and found out "that out of 300 audited sites, 97% are vulnerable to attack".

    Gartner组织估计大约75%攻击web应用并且300个调查的web应用里,97%都是容易被攻击的。

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • This pattern can provide an additional layer of security, and limit the attack surface of the system.

    这种模式可以提供一个额外安全限制了对系统攻击

    youdao

  • Via address resolution protocol in data link layer, hackers can launch various attacks, such as IP conflict attack, ARP deceive attack and ARP overflow attack.

    利用数据链路地址解析协议(ARP)可以进行IP冲突、ARP欺骗、ARP溢出等方式的网络攻击

    youdao

  • The traditional detect method of adopting acl for DOS can not identify the attack aiming at the fake address and application layer, and easily made the server cannot apply the normal service for user.

    对分布式拒绝服务攻击防护,传统方法采用路由访问控制列表过滤的防护方法,无法识别虚假地址针对应用层的攻击,而且容易造成服务器无法外部提供正常的服务。

    youdao

  • The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.

    发明涉及一种用于保护网络免于来自用户安全攻击并且尤其是对于第2交换机而言免于MAC洪流攻击的方法

    youdao

  • And when individual trees die due to lightning, insects, fungal attack or other causes, there is generally a second canopy layer waiting in the shade to take over and maintain productivity.

    个别树木死亡由于雷击昆虫真菌攻击其他原因一般第二等候阴凉处接管维持生产力

    youdao

  • We will address anomaly detection, and once an attack is detected how to divert traffic to a Guard cluster that provides a multi-layer intelligent filtering complex for intelligent attack mitigation.

    我们还将讨论非正常检测以及一旦检测攻击,应当如何把数据转移保护集群,保护集群可提供多层智能过滤综合应用,智能地缓解攻击。

    youdao

  • The transport layer is also susceptible to attack, as in the case of flooding.

    洪水可以简单,许多连接请求发送 敏感的节点。

    youdao

  • The transport layer is also susceptible to attack, as in the case of flooding.

    洪水可以简单,许多连接请求发送 敏感的节点。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定