Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
When script kiddies launch an attack, they typically do so without realizing the results of their actions, such as potentially crashing systems or inadvertently performing a denial of service (DoS).
当脚本kiddy启动一个攻击,他们通常不了解这种行为的后果,如潜在地破坏系统或无意识地执行拒绝服务攻击(DoS)。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denial of Service,DoS)攻击。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denial of Service,DoS)攻击。
Denial of Service (DoS) attack protection.
拒绝服务(Denial of Service,DoS)攻击保护。
Reusing IP addresses can lead to an unintentional Denial of Service attack (DoS).
重用IP地址可能会导致意外的 Denial of Serviceattack (DoS)。
However, several Denial of Service (DoS) attacks can be executed by getting the parser to read a single document without requiring any additional connections.
尽管如此,通过访问解析器来读取一个单独的文档,就可以进行拒绝服务(DoS)攻击,无需任何其他连接。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
They prevent Denial of Service (DOS) attacks that are either malicious or unintentional.
它们可防止恶意或无意的拒绝服务 (DOS)攻击。
The constraints protect against a class of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.
这些约束可以抵御某种类型的拒绝服务(DOS)攻击,这些攻击试图利用消息复杂性来占用终结点处理资源。
The constraints protect against a type of denial of service (DOS) attacks that attempt to use message complexity to tie up endpoint processing resources.
这些约束可以抵御某种类型的拒绝服务 (DOS)攻击,这些攻击试图利用消息复杂性来占用终结点处理资源。
Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.
随机数据包标记(PPM)是对拒绝服务攻击进行IP回溯的一种实用而有效的方法。
Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.
随机数据包标记(PPM)是对拒绝服务攻击进行IP回溯的一种实用而有效的方法。
应用推荐