| 1. | Analysis of ddos attack technology and the countermeasures 攻击的技术分析及防范策略研究 |
| 2. | Analysis on principle and some defense strategy of attack of ddos 攻击原理剖析和防御策略 |
| 3. | How to defend against ddos attacks 如何防御ddos攻击 |
| 4. | The systematic investigation of defending the ddos attack is also made 论文的另一部分工作是研究ddos攻击的防护策略。 |
| 5. | Because of simpleness and validity , it is used widely by attackers Ddos攻击由于实现简单、破坏性很大,而被攻击者广泛使用。 |
| 6. | Ddos , issued in recent years , is one of the severe threats on the internet Ddos攻击是internet目前面临的最严峻的威胁之一。 |
| 7. | Now most ddos attacks are tcp flood attacks and are implemented according to tcp protocol 目前大多数的ddos攻击通过tcp协议实现,主要采用tcp洪流攻击。 |
| 8. | The third part is design of d - gun as a whole , which is thinking in d - gun 第三部分阐述了新型ddos工具“ d ? gun ”的总体设计,论述了总体技术路线和工作流程。 |
| 9. | Thirdly , it can round firewall in a certain extent . in the process , the attack on router is attempted 在软件实现的过程中,对路由器的ddos攻击作了一定尝试。 |
| 10. | Nowadays distributed deny of service ( ddos ) attacks have become to be one of the greatest troubles in network security 目前,分布式拒绝服务( ddos )攻击已经成为影响internet安全的重大隐患之一。 |