拒絕服務攻擊 的英文怎麼說

中文拼音 [juégōng]
拒絕服務攻擊 英文
ddos
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  • 服務 : give service to; be in the service of; serve
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Distributed denial of service attacks prevention and countermove

    正態分佈與分散式拒絕服務攻擊的主動預防
  2. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊
  3. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨立的分散式拒絕服務攻擊軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos的全步驟;支持多種模型,特別是構造了反射拒絕服務攻擊和脈動模型,強度高且難追溯;有一定繞過防火墻的能力。
  4. The smurf attack is a very frightening form of denial of service attack due to its amplification effects

    Smurf拒絕服務攻擊的一種非常可怕的形式,因為它具有放大效應。
  5. Before the smurf attack came into vogue, the syn flood attack was the most devastating denial of service attack

    在smurf流行之前, syn擴散是最具破壞性的拒絕服務攻擊
  6. Detecting a p2p dos attack is easy ; defending against it is difficult

    P2p拒絕服務攻擊檢測容易,防禦困難。
  7. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  8. Analysis and defense of d. d. o. s attacking behavior

    拒絕服務攻擊行為的分析與防範
  9. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務攻擊威脅以及研究現狀進行分析描述;然後,從拒絕服務攻擊的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務攻擊進行有效過濾的方法,並用這種方法在linux內核中實現了一個高速過濾器,最後進行了相關的性能測試。
  10. This helps protect against denial of service attacks

    這樣有助於防止遭受拒絕服務攻擊
  11. Research on taxonomies of distributed denial of service

    分散式拒絕服務攻擊的分類學研究
  12. Research of distributed denial of service

    本文闡述了分散式拒絕服務攻擊
  13. Research on distributed denial - of - service attacks : a survey

    分散式拒絕服務攻擊樹建模
  14. Attack tree modeling of distributed denial of service attack

    反彈式拒絕服務攻擊的研究與對策
  15. Denial of service attacks and viruses are going to hit pdas

    拒絕服務攻擊和病毒將會pda 。
  16. Denial - of - service attacks are not addressed

    不能防止拒絕服務攻擊
  17. This is called a denial of service attack

    這叫做拒絕服務攻擊
  18. Denial of service attacks can have different goals, including

    拒絕服務攻擊可以有不同的目標,包括
  19. Provides an additional layer of security against potential denial of service attacks when deserializing untrusted data

    默認情況下, xmlserializer為反序列化不可信數據時可能受到的拒絕服務攻擊增加了一層安全保護。
  20. Ids has been fast developing since it ' s put forward. but intrusion detection technology is now wandering with the universal application of high - speed network, the appear of new attack methods like distributed denial of service attack, and the low efficiency and high false positive of today ' s idss

    但是,由於高速網路和交換式網路的普遍應用,以分散式拒絕服務攻擊為代表的新型方式的出現和發展,以及現有入侵檢測系統效率低下、誤報率和漏報率較高的問題無法得到有效解決等問題,目前入侵檢測技術正處于發展的關鍵時期。
分享友人