denial of service 中文意思是什麼

denial of service 解釋
拒絕服務攻擊
  • denial : n. 1. 否認,否定。2. 拒絕承認,拒絕相信,拒絕接受。3. 克制 (= self-denial)。
  • of : OF =Old French 古法語。
  • service : n 塞維斯〈姓氏〉。n 1 服務;工作;公務;職務;事務;業務;行政部門(人員),服務機構(人員)。2 ...
  1. Distributed denial of service attacks prevention and countermove

    正態分佈與分散式拒絕服務攻擊的主動預防
  2. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  3. A security issue has been identified in reliable multicast program for microsoft windows xp - based systems that could result in a denial of service

    現在已經證實microsoft windows xp系統的可靠多點傳送程式pgm有一個安全性問題,可能導致阻絕服務攻擊。
  4. The smurf attack is a very frightening form of denial of service attack due to its amplification effects

    Smurf攻擊是拒絕服務攻擊的一種非常可怕的形式,因為它具有放大效應。
  5. Before the smurf attack came into vogue, the syn flood attack was the most devastating denial of service attack

    在smurf攻擊流行之前, syn擴散攻擊是最具破壞性的拒絕服務攻擊。
  6. Windows 2000 security patch : telnet server denial of service vulnerability

    的用戶還同時下載了:
  7. Denial of service attacks ( dos ) use a networked computer or computers to bombard another networked computer or server communication traffic with the intention of disrupting or rendering the latter inoperable, or enabling unauthorized access

    妨礙信息傳送的攻擊是利用一部或多部聯網電腦連珠炮發地向另一部聯網電腦或伺服器傳送大量資料,意圖擾亂其運作、令其無法運作或擅自接達。
  8. It investigates the authentication mechanism on diffie - hellman ( dh ), which is why the ike protocol can " t avoid meeting denial - of - service attacks. the weak key confirmation and its key protocol are investigated

    最後,本文探討了弱密鑰認證方式( weakkeyconfirmation )以及基於這種認證方式構造的一種密鑰協商協議。
  9. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收集漏洞信息,造成拒絕訪問( denialofservice )等對計算機系統造成危害的行為。
  10. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  11. This may be indicative of a denial of service type of attack or of a web server that is overly utilized

    過高的cpu和內存使用可能預示著存在拒絕服務型攻擊,或者web服務器在超負荷運行。
  12. This helps protect against denial of service attacks

    這樣有助於防止遭受拒絕服務攻擊。
  13. Research on taxonomies of distributed denial of service

    分散式拒絕服務攻擊的分類學研究
  14. Research of distributed denial of service

    本文闡述了分散式拒絕服務攻擊
  15. Research on distributed denial - of - service attacks : a survey

    分散式拒絕服務攻擊的攻擊樹建模
  16. Attack tree modeling of distributed denial of service attack

    反彈式拒絕服務攻擊的研究與對策
  17. Denial of service attacks and viruses are going to hit pdas

    拒絕服務攻擊和病毒將會攻擊pda 。
  18. Denial - of - service attacks are not addressed

    不能防止拒絕服務攻擊。
  19. This is called a denial of service attack

    這叫做拒絕服務攻擊。
  20. Denial of service attacks can have different goals, including

    拒絕服務攻擊可以有不同的目標,包括
分享友人