| 1. | Setting this registry key may expose the server to a syn flood , denial - of - service attack 设置此注册表项可能会使服务器面临syn泛滥和拒绝服务攻击的威胁。 |
| 2. | It s also important to understand the damage that can be caused by attacks such as a syn flood 理解由诸如同步攻击( syn flood )之类的攻击所引起的损坏也很重要。 |
| 3. | Before the smurf attack came into vogue , the syn flood attack was the most devastating denial of service attack 在smurf攻击流行之前, syn扩散攻击是最具破坏性的拒绝服务攻击。 |
| 4. | This paper brings out a new approach that adopts the fuzzy - rule based technique to detect the syn flooding attacks 本文提出一种基于模糊逻辑规则检测出syn湮没( synflooding )攻击的方法。 |
| 5. | Combining with snort ids , i realize anti syn flood based on anomaly detection method as a preprocessor in snort ids 以预处理插件的形式,将antisynflood的模块加入snort入侵检测系统中。 |
| 6. | At the same time , it also explains the theories on hacker attack as usual , including tcp syn flooding , ping flooding and udp flooding and so on 文章在介绍相关安全防御的同时对于常见的黑客攻击原理也做了说明,包括tcpsyn湮没攻击、 ping湮没攻击、 udp湮没攻击等。 |
| 7. | The study of ddos and tcp syn flood becomes the hotspot of research about information security . many foreign and home manufactures develop the special products 对于ddos及tcpsynflood攻击的研究已成为信息安全研究的热点,国内外一些厂家也开发出了专门的应对产品。 |
| 8. | Finally , our system is analyzed and evaluated in a " syn flood " environment , and a method of applying clustering to anomaly detection is added to improve its performance 最后,本文对系统模型应用于网络拒绝服务攻击环境的实例进行了分析,并提出了一种应用聚类分析对系统的改进方法。 |
| 9. | The main innovative ideas in this paper are presented as follows : first , tcp relay method is applied to defend syn flooding attack and control the whole process of tcp connection 本论文的创新点体现在如下三个方面: ?提出了基于np的tcp中继方法,在保证吞吐率的前提下避免内网遭受恶意syn攻击。 |
| 10. | Sctp supports ordered or unordered message delivery . sctp is stronger to resist syn flooding attack than tcp . p2p file sharing technique is totally different from network file service based on client / server mode 利用sctp的多流机制和消息无序递交机制,本文提出了两种在p2p文件共享系统中抑制队头阻塞的方法。 |