Traditional flood attack (SYN flood) makes use of the leak of TCP protocol's three times handshake.
传统的洪水攻击(SYN洪水攻击)是用TCP协议三次握手的漏洞来实现的。
An attack called the SYN flood ensures that the ack packet never returns so that the server runs out of room to process incoming connections.
有一种称为syn泛滥(SYN flood)的网络攻击,它使ack数据包无法返回,导致服务器用光内存空间,无法处理到来的连接。
Finally, our system is analyzed and evaluated in a "SYN flood" environment, and a method of applying clustering to anomaly detection is added to improve its performance.
最后,本文对系统模型应用于网络拒绝服务攻击环境的实例进行了分析,并提出了一种应用聚类分析对系统的改进方法。
The server allocates resources for the connections upon receipt of the SYN, then under a flood of SYN packets, eventually runs out and is unable to service new requests.
服务器在接收syn报文之前,要为连接分配资源,但是在大量产生SYN报文的情况下,最终会耗尽自己的资源,从而无法处理新的请求。
The server allocates resources for the connections upon receipt of the SYN, then under a flood of SYN packets, eventually runs out and is unable to service new requests.
服务器在接收syn报文之前,要为连接分配资源,但是在大量产生SYN报文的情况下,最终会耗尽自己的资源,从而无法处理新的请求。
应用推荐