拒絕服務 的英文怎麼說

中文拼音 [jué]
拒絕服務 英文
denial-of-service attack
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : 服量詞(用於中藥; 劑) dose
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  • 服務 : give service to; be in the service of; serve
  1. Distributed denial of service attacks prevention and countermove

    正態分佈與分散式拒絕服務攻擊的主動預防
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  4. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨立的分散式拒絕服務攻擊軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos攻擊的全步驟;支持多種攻擊模型,特別是構造了反射拒絕服務攻擊和脈動攻擊模型,攻擊強度高且難追溯;有一定繞過防火墻的能力。
  5. The smurf attack is a very frightening form of denial of service attack due to its amplification effects

    Smurf攻擊是拒絕服務攻擊的一種非常可怕的形式,因為它具有放大效應。
  6. Before the smurf attack came into vogue, the syn flood attack was the most devastating denial of service attack

    在smurf攻擊流行之前, syn擴散攻擊是最具破壞性的拒絕服務攻擊。
  7. Detecting a p2p dos attack is easy ; defending against it is difficult

    P2p拒絕服務攻擊檢測容易,防禦困難。
  8. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  9. Analysis and defense of d. d. o. s attacking behavior

    拒絕服務攻擊行為的分析與防範
  10. Require the credit reference agency, on receipt of an " opt - out " request notified by the borrower s lender, to delete the terminated account information from its credit database

    F )規定信貸資料機構,收到由借款人的放款人發出的拒絕服務通知時,刪除信貸資料庫內有關的已結束帳戶的資料。
  11. This may be indicative of a denial of service type of attack or of a web server that is overly utilized

    過高的cpu和內存使用可能預示著存在拒絕服務型攻擊,或者web器在超負荷運行。
  12. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
  13. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務攻擊威脅以及研究現狀進行分析描述;然後,從拒絕服務攻擊的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務攻擊進行有效過濾的方法,並用這種方法在linux內核中實現了一個高速過濾器,最後進行了相關的性能測試。
  14. This helps protect against denial of service attacks

    這樣有助於防止遭受拒絕服務攻擊。
  15. Research on taxonomies of distributed denial of service

    分散式拒絕服務攻擊的分類學研究
  16. Research of distributed denial of service

    本文闡述了分散式拒絕服務攻擊
  17. Research on distributed denial - of - service attacks : a survey

    分散式拒絕服務攻擊的攻擊樹建模
  18. Attack tree modeling of distributed denial of service attack

    反彈式拒絕服務攻擊的研究與對策
  19. Denial of service attacks and viruses are going to hit pdas

    拒絕服務攻擊和病毒將會攻擊pda 。
  20. Denial - of - service attacks are not addressed

    不能防止拒絕服務攻擊。
分享友人