• Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.

    一些方法基于IP地址数据长度统计特征,这些方法IP地址欺骗攻击时检测急剧下降。

    youdao

  • Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    针对常见IP地址欺骗IP路由欺骗、ICM P重定向欺骗IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    youdao

  • As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    youdao

  • As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定