Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.
另一些方法基于IP地址和数据报长度的统计特征,但这些方法在IP地址欺骗攻击时检测率急剧下降。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
应用推荐