Additionally, the proposed scheme can efficiently withstand message replaying attack, forgery attack, Masquerade attack, guessing and stolen verifier attack and collusion attack.
同时该方案能有效地抵抗重放攻击,伪造攻击,猜测和窃取攻击,扮演攻击及用户合谋攻击等。
How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.
本文主要讨论如何通过网络伪装来防御操作系统的真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞的攻击。
How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.
本文主要讨论如何通过网络伪装来防御操作系统的真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞的攻击。
应用推荐