Flooding these systems with excessive request volumes will result in operational problems, and at worst, may lead to target endpoint system failure.
如果这些系统中涌入了过量的请求,那么将导致操作问题,并且在最坏的情况下,可能会导致目标端点系统故障。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
Based on random walk, RSR modifies request-forward manner by taking the popularity of neighbor nodes into consideration on passing searching request. FRSR combines flooding search with random walk.
RSR在随机漫步的基础上通过考虑邻居节点的热度改进请求转发方式,FRSR通过结合洪泛搜索改进随机漫步转发策略。
Based on random walk, RSR modifies request-forward manner by taking the popularity of neighbor nodes into consideration on passing searching request. FRSR combines flooding search with random walk.
RSR在随机漫步的基础上通过考虑邻居节点的热度改进请求转发方式,FRSR通过结合洪泛搜索改进随机漫步转发策略。
应用推荐