In view of the demand that distributed attack detection needs massive data, this paper puts forward a cooperative detection model based on component structure.
本文针对检测分布式入侵时海量数据分析的应用需求,提出一种基于组件结构的协同检测模型。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.
Krebs onSecurity报告称,只需几百美元,你就能到地下论坛上雇个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
But in most cases, what's really being referred to is a distributed DoS attack.
但是在大多数情况下,实际涉及到的是分布式DoS攻击。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
A distributed testing system for network attack was also designed. Its modularized structure made the system have good expansibility.
文中设计出了一个分布式网络攻击测试系统,模块化的体系结构使该系统具有良好的可扩展性。
To solve the primary user emulation attack and selfish misbehaviors in cognitive radio networks, this paper presents cluster-based security architecture for distributed cognitive radio networks.
针对认知无线电网络中出现的模仿主用户攻击和自私行为攻击问题,提出一种基于簇的分布式认知无线电网络安全体系结构。
In all-optical networks, distributed algorithms for attack localization was analyzed, and an all-optical network simulation platform was constructed for attack localization and resumption.
分析了全光网络分布式攻击定位算法,构建了全光网络攻击定位与恢复的仿真平台。
Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。
A member of that group pleaded guilty in US federal court earlier this year to a hacking charge for his role in a distributed denial-of-service attack that brought down church websites in 2008.
一名该组织成员与今年早些时候向美国联邦法院服罪,罪名是黑客犯罪,使用分布式拒绝服务攻击在2008年使该教会的网站瘫痪。
IP traceback is an important way to defend against distributed denial of service attack.
IP追踪是防御分布式拒绝服务攻击的重要方法。
We outline a distributed strategy to tackle the history-revision attack threat in a simple and elegant way.
我们采取了一种分散的策略,利用一个简单而合理的方式来处理历史攻击的威胁。
Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.
安全性:从硬件级别上实现故障和安全性的隔离,平台内置arp攻击防护能力,分布式和规模化提升防ddos攻击能力。
Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.
安全性:从硬件级别上实现故障和安全性的隔离,平台内置arp攻击防护能力,分布式和规模化提升防ddos攻击能力。
应用推荐