• So why even worry about IP spoofing?

    因此为什么还要担心IP欺骗呢?

    youdao

  • IP spoofing is a common but complex attacking method.

    IP欺骗常用一种攻击手段

    youdao

  • These kinds of attacks require the same level of skill as IP spoofing.

    这些类型攻击需要IP欺骗同等级别技巧

    youdao

  • As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    youdao

  • Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    针对常见IP地址欺骗IP路由欺骗、ICM P重定向欺骗IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    youdao

  • Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.

    一些方法基于IP地址数据长度统计特征,这些方法IP地址欺骗攻击时检测急剧下降。

    youdao

  • According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.

    通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用入侵检测,可增强网络抵御IP欺骗攻击的能力。

    youdao

  • The ARP spoofing is one of the spoofing on the network, which allows an attacker to redirect the IP packets on a network segment of Ethernet so that he can get the trust of the target host.

    ARP协议欺骗网络欺骗行为之一使得攻击者可以重定向一个以太网IP数据报以取得目标主机信任

    youdao

  • The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

    大量攻击机器使用地址欺骗使得现有跟踪是不可能的。

    youdao

  • ARP spoofing is defended effectively by binding IP and MAC or processing the ICMP redirect messages.

    通过IPMAC地址的绑定ICMP重定向报文处理有效地ARP欺骗进行防范。

    youdao

  • As analysing the principle of the ARP spoofing, some solutions for the spoofing are mentioned, such as the binding of MAC IP address and the configuration of switch.

    随后分析ARP欺骗实现原理给出MACIP绑定交换机设置一系列解决问题方案。

    youdao

  • Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    youdao

  • Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定