关于冰盾 | 使用条款 | 网站地图
 
syn洪水攻击
syn洪水攻击
作者:冰盾防火墙 网站:www.bingdun.com 日期:2014-11-27
 

相关语句
  syn flooding attack
     Based on knowledge above, this paper studies the firewall which can defend common DoS attack: ①Analyzing the traditional algorithms, this paper gives an proposed algorithm which protects against SYN flooding attack more effectively and preserves a high throughput.
     在此基础上,本文设计并实现了一种基于Linux且能抵御常见DoS攻击的防火墙:① 分析并改进了传统的抵御SYN洪水攻击算法,提高了防火墙的流量,增强了抵御SYN洪水攻击的能力。
短句来源
     In this paper, we present a simply and applied dyn amic model for detecting SYN flooding attack, which is the most popular DOS atta ck.
     本文提出了一个简单实用的动态检测模型用于检测 SY N洪水攻击 ,可以实时有效和准确地检测到最为流行的SYN洪水攻击
短句来源
     As a result, the stack may be overflowed by SYN flooding attack, which will cause the connection break off.
     这种漏洞使系统可能受到SYN洪水攻击而导致堆栈溢出,连接中断。
短句来源
  “syn洪水攻击”译为未确定词的双语例句
     In the invading and attacking actions of using TCP, the targets are the actions of TCP SYN Scanning and TCP SYN Flooding.
     在“与TCP协议相关的典型入侵攻击”中研究的是TCP SYN扫描和TCP SYN洪水攻击
短句来源
     Traditional flood attack (SYN flood) makes use of the leak of TCP prot ocol's three times handshake.
     传统的洪水攻击 ( SYN洪水攻击 )是用 TCP协议三次握手的漏洞来实现的。
短句来源
     In the aspect of netvvork performance analysis, a new idea appears in the paper that, vvith the increase of netvvork load and the increase of connection rate, the model of netvvork traffic tends from instability towards Poisson distribution rather than vveight tailed distribution advanced 1990s and long range dependence distribution.
     本文在网络安全方面提出了应用BP神经网络对SYN洪水攻击进行检测,在网络性能分析方面提出了在网络负载增大与连接速率提高的情况下,网络流量模型呈现不稳态,并非90年代提出的重尾分布和长范围相关特性,而是随着网络负载的增大,流量模型趋向泊松分布。
短句来源
     The system takes little resource for its performance, which is not only realizing the process-associating network supervisory function of individual firewall, and defending the attack of ICMP and SYN flood, but also realizing the bottom layer packet filter function in packet filter regulation of packet filter firewall's customers,and along with the surveillance of network circulated data package. It also offers linking information management in the development of individual firewall for the first time, which makes users master more network information.
     本系统性能上占用系统资源少,功能上不但实现了个人防火墙的进程关联网络管理,防御ICMP洪水攻击和SYN洪水攻击,还实现了滤包防火墙的用户自定义滤包规则底层滤包,并首次在个人防火墙的开发上提供网络流通数据包监视以及连接信息管理,使用户掌握更多的网络信息。
短句来源
  相似匹配句对
     Syn.
     Syn.
短句来源
     Syn(+).
     Syn(-)。
短句来源
     The Flood
     洪水
短句来源
     Flood attack on IP packets
     基于IP数据包的洪水攻击
短句来源
     Analysis of SYN flooding attack
     SYN Flooding攻击问题的分析
短句来源
 查询“syn洪水攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句 
 
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  syn flood attack
A scanning and a TCP SYN flood attack are occurred at time t1 and t2 respectively.
例句来源      
As an example, consider the syn flood attack records shown in Table 5.
例句来源      
As an example, let us consider the SYN flood attack.
例句来源      
In our case, the Traceback Module will subscribe to the xmlBlaster server to receive notification of the detection of a SYN Flood attack.
例句来源      
In particular, we inserted a SYN-flood attack out of every 5 packets.
例句来源      
更多          
  syn flooding attack
If a SYN flooding attack is detected at the first-mile leaf router, information about the location of flooding sources is also captured.
例句来源      
So, the last-mile FDS can detect the SYN flooding attack in 20 seconds.
例句来源      
Similar to TCP protocols in the Internet, the mobile node is vulnerable to the classic SYN flooding attack or session hijacking attacks.
例句来源      
This might cause the resulting traffic flows to be incorrectly classified as a SYN flooding attack.
例句来源      
The SYN-Flooding attack exploits both this design and the authentication weakness in IP.
例句来源      
更多          



         Traditional flood attack (SYN flood) makes use of the leak of TCP prot ocol's three times handshake. This paper also uses Jpcap to put this kind of attack to realization, and compare this type of flood attack with SYN flood.
            传统的洪水攻击 ( SYN洪水攻击 )是用 TCP协议三次握手的漏洞来实现的。文章指出 IP协议也存在着类似的问题 ,用 Jpcap类库包编程也能实现洪水攻击 ,并对基于 TCP和 IP的洪水攻击进行了比较
文摘来源
         Distributed denial of service attack forms a prolific threat to Internet. The resources of servers are quickly consumed under such an attack, making them unav ailable to legitimate users. In this paper, we present a simply and applied dyn amic model for detecting SYN flooding attack, which is the most popular DOS atta ck. It can detect SYN flooding attack in real time effectively and accurately. We adapt a selfadaptive algorithm that is based on CUSUM (Cumulative S um) algorithm to decrease the ratio of f...
            分布式拒绝服务攻击对 Internet威胁很大。正常服务器在这种攻击下资源会被很快消耗掉 ,从而不能为合法用户提供服务。本文提出了一个简单实用的动态检测模型用于检测 SY N洪水攻击 ,可以实时有效和准确地检测到最为流行的SYN洪水攻击。在模型中采用基于 CU SU M(Cumulative Sum)的自调整算法 ,可以有效降低系统的误报率
文摘来源
         Network firewall is a computer network security product to a certain extent, which can defense the illegal invasion and attack on the Internet. Individual firewall is the only one which is suitable to PC users. The system takes little resource for its performance, which is not only realizing the process-associating network supervisory function of individual firewall, and defending the attack of ICMP and SYN flood, but also realizing the bottom layer packet filter function in packet filter regulation of pack...
            网络防火墙是在一定程度上防御网络上非法用户入侵和攻击的计算机网络安全产品,其中个人防火墙是适用于PC用户的网络安全产品。本系统性能上占用系统资源少,功能上不但实现了个人防火墙的进程关联网络管理,防御ICMP洪水攻击SYN洪水攻击,还实现了滤包防火墙的用户自定义滤包规则底层滤包,并首次在个人防火墙的开发上提供网络流通数据包监视以及连接信息管理,使用户掌握更多的网络信息。本系统使用的技术包括NDISIMD、SPI、Ring0驱动跟Ring3APP通讯、网络安全知识以及高级GUI,其中对NDISIMD和SPI这两项防火墙主要技术进行了深入的研讨。NDISIMD是微软设计的在Ring0层提供接口进行开发的驱动程序,通过对内核驱动的开发并进行封装,为应用层提供对底层调用的接口。SPI是微软提供的在应用层进行上层Socket进程关联滤包的防火墙技术。本系统采用了WinDDK2003驱动开发环境作为NDISIMD的开发工具,采用DriverStudio下的SoftICE和DriverMoniter作为其调试工具。应用层使用VisualStutio.Net2003下的VC对Ring0层跟...
 

 
最新内容:
CC攻击原理,表现与防御办法[2014-11-27]
TCP/IP SYN 洪水攻击测试产品[2014-11-27]
通过 Facebook Notes 可以 DDOS 攻击任何网站[2014-11-27]
DDOS攻击解决过程[2014-11-27]
DDoS攻防战 (二) :CC攻击工具实现与防御理论[2014-11-27]
优化LINUX内核阻挡SYN洪水攻击[2014-11-27]
相关内容:

合作伙伴: 黑基网 补天科技 威盾科技 站长下载 新飞金信 北京电信 ZOL应用下载
中华人民共和国增值电信业务经营许可证京ICP备14024464 公安备案号 京1081234 
版权所有©2003-2014 冰盾防火墙  www.BingDun.com 法律声明
总机:(010)51661195