• You can see that the attacker will only have to send a few SYN packets every ten seconds or so to disable a specific port.

    发现攻击者只要秒钟左右发送几个syn可以禁用特定端口。

    youdao

  • The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.

    恶意客户机使用虚假地址来伪造一个IP报文时,TCP出现问题,这会大量 TCPSYN报文攻击服务器

    youdao

  • The server allocates resources for the connections upon receipt of the SYN, then under a flood of SYN packets, eventually runs out and is unable to service new requests.

    服务器接收syn报文之前,要连接分配资源但是大量产生SYN报文情况最终耗尽自己的资源,从而无法处理新的请求。

    youdao

  • You can specify which incoming TCP packets to scan and discard those that don't match the flags ack, FIN, PSH, RST, SYN, or URG.

    可以指定应该扫描哪些到达的TCP数据包丢弃ackFIN、P SH、RSTsynurg标志匹配的数据包。

    youdao

  • The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses.

    攻击包括一个客户端多次发送SYN数据包同步服务器每个端口使用IP地址

    youdao

  • For example, the initial SYN request can be a gold mine (as can the reply to it). RST packets also have some interesting features that can be used for identification.

    例如初始化的SYN请求一个金矿以为这个SYN请求是回复的,RST信息包具有一些比较有趣特征用来鉴别系统

    youdao

  • For example, the initial SYN request can be a gold mine (as can the reply to it). RST packets also have some interesting features that can be used for identification.

    例如初始化的SYN请求一个金矿以为这个SYN请求是回复的,RST信息包具有一些比较有趣特征用来鉴别系统

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定