disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.
数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
To resolve the problem of detecting Distributed Denial of Service (DDoS) attacks, a dynamic threshold detection method based on fuzzy logic was proposed.
针对分布式拒绝服务攻击的检测问题,提出基于模糊逻辑的动态的阈值检测方法。
Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.
分布式拒绝服务攻击并没有用来侵入后台数据库,这一攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。
This paper mainly researches into methods to defend against distributed denial of service attacks.
本文主要研究针对此类攻击的有效防范方法。
In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.
提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。
Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.
敲诈,通过使用妥协的“蛇神”计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.
敲诈,通过使用妥协的“蛇神”计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
应用推荐