IP traceback is an important way to defend against distributed denial of service attack.
IP追踪是防御分布式拒绝服务攻击的重要方法。
This paper mainly researches into methods to defend against distributed denial of service attacks.
本文主要研究针对此类攻击的有效防范方法。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
The hacking group has used a technique known as a distributed denial of service (DDoS) in an attempt to take the sites offline.
黑客集团已利用一种称为分布式拒绝服务(DDoS)的技术企图使该网站离线。
Officials in both Seoul and Washington, DC, said they were suffering “distributed denial of service” overload (known as DDOS in geekspeak).
首尔与华府的官员声称他们经历了“分布式拒绝服务”过载(在极客术语中被称为DDOS)。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
To resolve the problem of detecting Distributed Denial of Service (DDoS) attacks, a dynamic threshold detection method based on fuzzy logic was proposed.
针对分布式拒绝服务攻击的检测问题,提出基于模糊逻辑的动态的阈值检测方法。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
Extortion by using a network of compromised "zombie" computers to engage in distributed denial of service attacks against the target Web site until it starts paying protection money.
敲诈,通过使用妥协的“蛇神”计算机网络,来参与分布其取消服务来攻击那些反对的目标网站,直到它开始支付保护费。
Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.
Krebs onSecurity报告称,只需几百美元,你就能到地下论坛上雇个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。
Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.
分布式拒绝服务攻击并没有用来侵入后台数据库,这一攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。
The emergence of the DDoS (Distributed Denial of Service), which has made DID (Distributed intrusion detection) an important research point of the intrusion detection and the whole network safety.
分布式拒绝服务攻击的出现已经使分布式入侵检测逐渐成为入侵检测乃至整个网络安全领域的又一研究重点之一。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
disruptions, such as distributed denial-of-service attacks aimed at overloading or paralyzing a website;
崩溃,譬如分散式拒绝服务袭击,旨在使网站运行超载或使它瘫痪;
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks.
数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。
A member of that group pleaded guilty in US federal court earlier this year to a hacking charge for his role in a distributed denial-of-service attack that brought down church websites in 2008.
一名该组织成员与今年早些时候向美国联邦法院服罪,罪名是黑客犯罪,使用分布式拒绝服务攻击在2008年使该教会的网站瘫痪。
In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.
提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。
In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.
提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。
应用推荐