We employ enterprise-level DDOS attack protection service.
我们采用企业级的DDOS攻击的保护服务。
In a typical DDOS attack, there may be millions of such fake approaches.
在一次典型的DDOS攻击中,可能会有数百万条这种虚假请求。
Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.
互联网服务供应商说,在DDoS攻击后,他们很少能查到僵尸电脑网络的主控计算机。
The goal of the DDoS attack is to do the same thing as the DoS, but on a much grander and more complex scale.
DDoS攻击的目标和DoS一样,但它的规模更大,也更加复杂。
Where DoS is just an annoyance, a DDoS attack can be downright deadly, as it can take a server offline quickly.
如果说 DoS攻击仅会让人感觉讨厌的话,那么DDoS 攻击则是致命的,因为它能迅速使服务器离线。
During the war between Russia and Georgia last year, hackers brought down several Georgian websites using a DDoS attack.
去年,俄罗斯和格鲁吉亚交战期间,黑客们使用DDoS攻击瘫痪了格鲁吉亚的几家网站。
The EMO website is temporarily off-line due to a DDOS attack. We are currently working on solving this issue. Thank you for your patience.
EMO网站受到攻击临时关闭。我们当前正在解决这个问题。谢谢您的耐心。
This taxonomy reviews current DDOS defense mechanisms and focuses on finding new features in the DDOS attack problems that have not been solved.
这种分类法评论了当前的DDOS防御机制并专注于在还没有解决的DDOS攻击难题中发现新特征。
Firstly, I will introduce the characteristic, current status and development trend of DDoS attack, analyze and investigate the defense mechanisms.
首先介绍了分布式拒绝服务攻击的特点、现状以及发展趋势,分析并探讨了分布式拒绝服务攻击的各种防御措施。
The closest equivalent to a DDOS attack in the offline world would be a mass sit-in or a mob milling around a building, making entry and exit impossible.
现实世界里,最接近分布式拒绝服务攻击的则是大规模静坐或乌合之众,他们把建筑物围得水泄不通,没人可以进出。
Security: from a hardware level fault isolation and security platform built-in ARP attack protection, and large-scale promotion distributed anti-DDOS attack.
安全性:从硬件级别上实现故障和安全性的隔离,平台内置arp攻击防护能力,分布式和规模化提升防ddos攻击能力。
A ping flooding attack is a simple DDoS attack in which a computer sends a packet (ping) to another system with the intention of uncovering information about services or systems that are up or down.
ping洪水攻击是一种简单的DDoS攻击。在这种攻击中,一个计算机向另一个系统发送一个包(ping),以找到关于服务或系统的信息。
The seedier elements of DDoS attacks showed around this time as the technique began to be used by organised criminals to blackmail and extort money from small businesses by threat of cyber-attack.
随着DDoS攻击开始被有组织犯罪以发起网络攻击为威胁成为敲诈勒索小公司钱财的手段,这个技术肮脏的一面开始闪现。
Krebs on Security reports that for a few hundred dollars you can go to an underground forum and hire someone (evidently Russian) to mount a distributed denial of service (DDoS) attack on a site.
Krebs onSecurity报告称,只需几百美元,你就能到地下论坛上雇个人(显然是俄罗斯人),对某个网站发起分布式拒绝服务攻击(DDoS)。
To accomplish these goals, attackers may enact an attack such as the traditional DoS or distributed denial of service (DDoS).
为实现这些目标,攻击者可能实施传统DoS或分布式拒绝服务(DDoS)攻击。
Generally, the group launches a "denial of service" (DDoS) attack, which targets and cripples a specific site.
通常这个团体会对目标发动一次“阻断服务”(DdoS)攻击,目的是要使某个特定网站瘫痪。
Using a Distributed Denial of Service (DDoS) attack, hacktivists make websites inaccessible using botnets, and overwhelming the target site with server requests.
利用分布式拒绝服务(DDoS)攻击,激进黑客使用僵尸网络和用服务器请求淹没目标网站的方式,让网站无法访问。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
Botnets are often used to perform distributed denial-of-service (DDoS) attacks, which bring web servers down by overloading them with traffic, but this new line of attack is different.
僵尸网络通常被用于进行分布式拒绝服务(Distributed Denial of service,DDoS)攻击,其可以通过使其流量过载的方式使网络服务器瘫痪;但这种新的攻击与之不同。
应用推荐