助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   flood攻击 的翻译结果: 查询用时:0.016秒
图标索引 在分类学科中查询
所有学科
互联网技术
更多类别查询

图标索引 历史查询
 

flood攻击
相关语句
  flood attack
     Source Code Analysis on SYN Flood Attack
     SYN Flood攻击源代码分析
短句来源
     Defending against SYN Flood Attack by Netfilter/iptables
     利用Netfilter/iptables抗御SYN Flood攻击方法研究
短句来源
     The SYN Flood attack is the most popular DOS/DDOS attack method.
     SYN Flood攻击是目前最流行的DOS/DDOS攻击手段。
短句来源
     So SYN Cookie can resist SYN Flood attack effectively.
     从而有效地抵御SYN Flood攻击
短句来源
     SYN Flood attack is one of the most popular Dos and DdoS attack ways.
     SYN Flood攻击是当前最流行的DoS(拒绝服务攻击)与DDoS(分布式拒绝服务攻击)的攻击方式之一。
短句来源
更多       
  “flood攻击”译为未确定词的双语例句
     (2) It discusses the principle and implement elaborately of SYN Cookie scheme, and put s forward the shortage of SYN Cookie scheme.
     (2)对SYN Cookie方案的原理进行细致的分析,在vxWorks平台上实现了SYN Cookie技术,从而成功验证了SYN Cookie在预防SYN Flood攻击时的有效性。
短句来源
     A WAY TO CREATE MISUSE RULES TO DETECT SYNFLOOD BASED ON SVM
     基于SVM分类器的SYN Flood攻击检测规则生成方法的研究
短句来源
     Thirdly, the uncertainty problem in the performance test of security products is analyzed, and the measure uncertainty problem in delay performance test is also studied. In this thesis, based on the general evaluation criterion CC(Common Criteria) and for the defects of TCP/IP, the implementation approach of verification test for SYN Flood and Teardrop attacks is given.
     论文研究了性能测试中的不确定度问题,并列举了延迟性能的测量不确定度评定:论文从通用评估准则CC出发,并针对TCP/IP协议的自身缺陷,给出了SYN Flood攻击和Teardrop攻击等验证测试方法的实现;
短句来源
     The hop-count information is indirectly reflected in the TTL field of the IP header.
     因此,我们提出基于TTL值检测防御TCP SYN Flood攻击
短句来源
     The inside safe loophole and the CGI( the Common Gateway Interface ) attack is also important safety suffer.
     并讨论了利用TCP/IP协议的漏洞的一些常见的攻击方式和手段,包括TCP SYN拒绝服务攻击、TCP标志位攻击、SYN-Flood攻击、IP包攻击、ICMP攻击。
短句来源
更多       
  相似匹配句对
     Source Code Analysis on SYN Flood Attack
     SYN Flood攻击源代码分析
短句来源
     So SYN Cookie can resist SYN Flood attack effectively.
     从而有效地抵御SYN Flood攻击
短句来源
     necatrix, which showed anamnestic response to reinfection with E.
     necatrix的攻击
短句来源
     difficile.
     difficile攻击
短句来源
查询“flood攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  flood attack
A basic flood attack might use UDP or ICMP packets to simply consume all available bandwidth.
      
A scanning and a TCP SYN flood attack are occurred at time t1 and t2 respectively.
      
An example is a network-based flood attack that permits a limited number of successful connections to an Internet service.
      
As an example, consider the syn flood attack records shown in Table 5.
      
As an example, let us consider the SYN flood attack.
      
更多          


This paper analyzes the theory, attack model and the basic character of Syn flood. Patricia binary radix tree is used to count the number of the syn packets, check the connection state by an improved method. In this way, the Syn flood attack can be detected with few resources.

分析了Syn flood攻击的原理、攻击的方式及其基本特征。利用Patricia树进行SYN流量统计,并提出了改进的TCP连接状态检测。试验表明,该检测算法在占用很少系统资源的情况下,准确检测到Syn flood攻击

In an attempt to prevent the Distributed Denial of Service(DDoS) which poses great threats to the security of Internet, the concept and mechanism of DDoS are discussed together with details such as how the hacker initiates the attack by example of SYN Flood Attack. Several preventive measures are presented to reduce the likelihood of DDoS attack.

分布式拒绝服务攻击(DDoS)的攻击手段严重威胁着Internet的安全。阐述DDoS攻击概念和原理,结合SYN Flood攻击着重描述了攻击者是如何组织并发起的DDoS攻击,最后探讨一些防御DDoS攻击行之有效的措施。

SYN flood is the most popular DOS(Denial of Sever) attack at present. It makes lots of half-connection to use up the net resource through send huge number of TCP connect-request packet. It is difficult to defense this kind of attack because the packets it sent are the normal packets with fake IP address. This article analysis the elements of SYN flood attack and why it is so difficult to defense. And the article also gives a way to defense SYN flood through twice detect and interdiction: First, detect the abnormal...

SYN flood is the most popular DOS(Denial of Sever) attack at present. It makes lots of half-connection to use up the net resource through send huge number of TCP connect-request packet. It is difficult to defense this kind of attack because the packets it sent are the normal packets with fake IP address. This article analysis the elements of SYN flood attack and why it is so difficult to defense. And the article also gives a way to defense SYN flood through twice detect and interdiction: First, detect the abnormal packet using the classifier based on the SVM(Support Vector Machine) arithmetic, than create the misuse rule using the similar degree of the vector of these packet to interdict the attack packets. The result of the experiment shows that the effect this way to defense SYN flood is evidence.

洪泛攻击(SYN flood)是目前最常用的拒绝服务攻击之一,它通过发送大量TCP请求连接报文,造成大量的半连接从而消耗网络资源.由于洪泛攻击中所使用的数据包都是正常数据包,又采用了伪IP技术,使得对其的检测和阻断都十分困难.本文分析了洪泛攻击的攻击原理以及检测并阻断攻击困难的原因,提出了二次检测的防御方法,先用SVM异常检测分类器检测出攻击报文,再依据报文相似度生成误用检测规则从而阻断攻击报文.试验结果表明这种方法对SYN flood攻击的检测效果明显。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关flood攻击的内容
在知识搜索中查有关flood攻击的内容
在数字搜索中查有关flood攻击的内容
在概念知识元中查有关flood攻击的内容
在学术趋势中查有关flood攻击的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社