dos attack 中文意思是什麼

dos attack 解釋
堵死騷擾
  • dos : 版本
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  2. An attacking node can personate other nodes through replaying their binding messages, changing the address field to provide wrong return address, and achieving dos ( denial of service ) attack by replaying binding messages

    攻擊節點可以通過重放節點綁定信息的形式來冒充此節點;通過修改綁定消息中的地址部分來提供虛假地址;還可以通過大量重放監聽到的綁定消息進行拒絕服務攻擊。
  3. Detecting a p2p dos attack is easy ; defending against it is difficult

    P2p拒絕服務攻擊檢測容易,防禦困難。
  4. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  5. Among the network attack meanings, denial of service ( dos ) is one of important network attack, it mainly uses the bug of network protocol

    在這些網路攻擊中,拒絕服務( denialofservice , dos )攻擊作為一種重要的網路攻擊手段,該攻擊主要利用了網路協議的缺陷。
  6. Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users

    它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種防禦措施來削弱和消除攻擊流量對網路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。
  7. The current internet key exchange protocol ike is too complicated to effectively prevent dos attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time

    目前ipsec的密鑰交換協議ike過于復雜,不能有效的防止dos攻擊,協議輪數太多,這些都嚴重影響了協議的性能和互操作性,同時導致了許多安全漏洞。
  8. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  9. In detail analyzing linux stateful inspection firewall source code, the new defending dos attack method has been

    3 .對常見的幾種防synflood的dos攻擊模型進行了對比分析,改進了一種新的防dos攻擊的模型。
  10. In this paper, the basic research of stateful inspection firewall has been made, enumerating the basic principle and method of dos attack

    2 .對常見dos攻擊的原理和方法進行了討論,給出了一些常見的防dos攻擊的防禦方法。
  11. The stateful inspection firewall is a milestone, it checkes data packet by connecting previous data packet. it is possible to prevent dos attack using stateful inspection firewall

    本文的主要內容有: 1 .在介紹狀態檢測防火墻基本概念的基礎上,詳細的分析了linux防火墻netfilter的狀態檢測部分的源代碼程序。
  12. Stateful inspection firewall is a milestone of the development of firewall. it makes impossible to prevent from dos attack by checking data packet indepentantly. the packet filter firewall hardly meets the need of network defence

    狀態檢測防火墻作為防火墻發展中的一個里程碑,由於它對數據包的檢測與先前的數據包相關聯,使其對dos攻擊的防禦成為可能。
  13. Based on the researches of the detection and defense technology uptodate, we develop our own method to detect and defense dos attack. it integrates many technologies and can defense nearly all kinds of dos attacks

    通過研究目前dos攻擊檢測技術和防禦技術,我們提出了自己的檢測方法和防禦方法,我們的方法將多種技術有機結合,實現對各種dos攻擊的防禦。
  14. Intranet attack include : information - detector, ip - deceive, dos, password - attack, man - in - the - middle - attack, application layer attack, network reconnaissance, trust exploitation, port redirection, virus. it is helpful to obtain complete and distinct security requirements with intranet security risk analysis. 2

    主要包括數據包探測器、 ip電子欺騙、拒絕服務、密碼攻擊、中間人攻擊、應用層攻擊、網路偵察、信任利用、埠重定向、病毒和特洛伊木馬。
  15. If mirc is installed, it allows the computer to be used in dos attack

    如果安裝了mirc ,她會利用受感染的電腦進行dos攻擊。
  16. At first, this papers presents dos ' s definition, classification, history and developing trend, and emphasizes on the analysis of typical attack approaches

    本文首先介紹了dos的定義、思想、分類、歷史及發展趨勢,重點對典型的攻擊方法進行了分析。
  17. Distributed denial of service ( ddos ) attack is a newly developed attack type, which is the extension of denial of service ( dos ) attack

    分散式拒絕服務( ddos )攻擊是近年來出現的一種全新的拒絕服務( dos )攻擊方式。
  18. Network attacks damaged networks and users, among which dos ( denial of service ) attacks become one of the common network attack techniques by the characteristics, such as extensive area, strong concealment, simpleness and efficiency, etc. dos attacks greatly affected the effective service of network and host systems, especially among which, ddos ( distributed denial of service ) attacks are greatly threatening internet, since they are difficult to recognize and defense due to their concealment and distribution

    隨著網際網路的迅速普及和應用的不斷發展,各種黑客工具和網路攻擊手段也隨之倍出,網路攻擊導致網路和用戶受到侵害,其中拒絕服務( dos , denialofservice )攻擊以其攻擊范圍廣、隱蔽性強、簡單有效等特點成為常見的網路攻擊技術之一,極大地影響網路和業務主機系統的有效服務。其中,尤其是分散式拒絕服務( ddos , distributeddenialofservice )攻擊,由於其隱蔽性和分佈性很難被識別和防禦嚴重威脅著internet 。
分享友人