引诱攻击 meaning in Chinese
decoy attack
Examples
- Note that a full stack walk is not performed with this type of demand and that your code is still susceptible to luring attacks
注意,对此类型的要求不会执行完整的堆栈步,因而您的代码仍然很容易遭受引诱攻击。 - Demanding permissions of all callers at run time affects performance , but it is essential to help protect code from luring attacks by less - trusted code
在运行时要求所有调用方都拥有权限会影响性能,但这对于帮助保护代码免遭受信程度较低的代码的引诱攻击至关重要。 - The stack walk is designed to help prevent luring attacks , in which less - trusted code calls highly trusted code and uses it to perform unauthorized actions
堆栈步旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权的操作。 - A honeypot is used in the area of computer and internet security . it is a resource , which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques . it can also be used to attract and divert an attacker from the real targets
蜜罐系统是应用于计算机网络安全领域的资源,它的价值就是引诱攻击者攻击以获取攻击者和他们技术的相关信息,它也可以用来吸引和分散攻击者的注意力,以保护真实的网络系统。 - It reframes the traceback problem as a polynomial reconstruction problem , and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction . the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos , which is a tool of traceback , lures the attacker to believe that he successfully compromised a slave for his needs , convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense , which is a useful adjunt to traceback systems , deploys a ddos defense system at source - end networks . attacks are detected by monitoring two - way traffic flows , and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最后,就有关ddos攻击反向追踪问题,从四个方面对其解决方案进行了研究:在分析比较几种反向追踪算法的基础上,着重研究了代数方法编码反向追踪信息的方案,该方案把追踪重构问题当作多项式重构问题,使用代数编码理论技术提供鲁棒的传送和重构方法,是dos攻击过程中的反向追踪问题的一种新的解决方法; ddos陷阱作为反向追踪的工具,引诱攻击者相信自己成功与所需的傀儡主机通话,令人信服地模拟出潜在ddos攻击体系结构;基于源的ddos防御方法作为反向追踪有用的补充,将防御系统部署在源网络,通过监控双向流量检测攻击和限制速率终止来自源的攻击;基于向后倒推的防御ddos的路由机制把ddos攻击看作拥塞控制问题,添加功能到每个路由器来检测并优先丢弃可能属于攻击的包,通过向后倒推上级路由器也得到通知而把这样的包丢弃。