对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
但进行拒绝服务攻击时,攻击者不必获得对系统的控制权。
But with denial of service attacks, attackers don't need to gain access to a system.
下列哪一种方法,以抵御拒绝服务攻击,在受害者的网页?
Which of the following is a method to defend against denial of service attacks at the victim's website?
提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制。
In this paper, an adaptive router throttle algorithm is presented to defend a server against distributed denial-of-service (DDoS) attacks.
拒绝服务攻击:通常,黑客瞄准特定系统,闯入系统以便将其用于特定用途。
Denial of service attacks: Often, attackers target particular systems, breaking into them so they can be used for specific purposes.
然后,他们勒索威胁,进行针对该公司的网站拒绝服务攻击的公司。
Then they blackmail companies by threatening to conduct a DoS attack against the corporate website.
有人为分布式拒绝服务攻击辩护,说它是类似于表达不满情绪,是合法的。
Some argue that DDOS attacks are, similarly, a legitimate expression of dissent.
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
恶意攻击者可以利用这一点,通过Internet对网络服务发动远程拒绝服务攻击。
A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.
与其他算法相比,该算法能有效对抗来自网络的恶意授权实体的拒绝服务攻击。
Compared with other algorithms, the algorithm can effectively fight the denial of service attacks from malicious authorized entities in the networks.
介绍了国际互联网中拒绝服务攻击的含义、现象和方法,并提出了一些防范措施。
This paper introduces the implications, phenomena, and methods of the attack of the service denial on the Internet, and offers a few preventive measures.
针对分布式拒绝服务攻击的检测问题,提出基于模糊逻辑的动态的阈值检测方法。
To resolve the problem of detecting Distributed Denial of Service (DDoS) attacks, a dynamic threshold detection method based on fuzzy logic was proposed.
随机数据包标记(PPM)是对拒绝服务攻击进行IP回溯的一种实用而有效的方法。
Probabilistic packet marking (PPM) is a practical and effective method for IP traceback of denial-of-service(DoS) attack.
黑客可以用恶意实例资源和恶意数据请求淹没恶意虚拟机的邻居,由此实现拒绝服务攻击。
The hacker accomplishes this by flooding the malicious virtual machine's neighbors with malicious instance resources and malicious data request queues.
另一个产品特性是集成了防止拒绝服务攻击的技术,即使受到攻击也能保证连续的服务。
Also featured is integrated Denial of service attack prevention technology that provides continuity of service to users in case of an attack.
针对各种各样的攻击实施威胁保护是必须的,比如拒绝服务攻击(DoS)和XML威胁。
Threat protection against a bewildering variety of attacks may be required such as denial of service (DoS) and XML threats.
尽管对抗拒绝服务攻击的能力在逐渐提高,但是DDoS案件在最近五年一直呈上升趋势。
Despite the gradually improving ability to handle denial-of-service attacks, DDoS incidents persisted with increasing scale in the second half of the decade.
他们首先尝试了DDoS攻击,也就是分布式拒绝服务攻击——向攻击目标发送大量数据。
They first attempted a distributed denial of service (DDoS) attack, which floods a target with massive amounts of traffic.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
这一点可能是不受人们欢迎的,因为它会通过向应用程序传送不合法的请求而助长拒绝服务攻击。
This may be undesirable as it promotes denial-of-service attacks by feeding illegal requests to the application.
当这两种类型的实体与Web浏览器的呈现引擎一起使用时,可能被用于创建拒绝服务攻击或其他恶意文档。
Both types of entities might be used to create denial of service attacks or other malicious documents when used with a Web browser's rendering engine.
从根本上讲,所有这些方法都能减轻从程序接管攻击到拒绝服务攻击的缓冲区溢出攻击所带来的破坏。
Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.
本文在阐述拒绝服务攻击基本概念的基础上,分析并探讨了网络负载均衡技术在网络抗拒绝服务中的应用。
The application of network load balancing technology in network anti-denial of service was analyzed and discussed on the basis of expounding basic concept which was attacked by anti-denial of service.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
曾有过拒绝服务攻击经历的运营商常说,事件至少会有一些影响,从轻微的服务中断,到持续的破坏和关键故障。
Operators who had experienced denial of service attacks often said the incidents had at least some effect, from minor service interruptions to sustained damage and critical breakdowns.
分布式的拒绝服务攻击需要用许多台电脑对一个网站集中进行流量轰炸,使其因负担过重而不能提供正常的服务。
A distributed denial of service attack involves using many computers to bombard a Web site with an overload of traffic, knocking it offline.
现实世界里,最接近分布式拒绝服务攻击的则是大规模静坐或乌合之众,他们把建筑物围得水泄不通,没人可以进出。
The closest equivalent to a DDOS attack in the offline world would be a mass sit-in or a mob milling around a building, making entry and exit impossible.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
最后,本文对系统模型应用于网络拒绝服务攻击环境的实例进行了分析,并提出了一种应用聚类分析对系统的改进方法。
Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.
应用推荐