您要查找的是不是:
- So SYN Cookie can resist SYN Flood attack effectively. 从而有效地抵御SYN Flood攻击。
- A large number of SYN flood attack to send the source code. 一个能够发送大量SYN洪水导致系统崩溃的攻击程序源代码。
- Before the Smurf attack came into vogue, the SYN flood attack was the most devastating Denial of service attack. 在Smurf攻击流行之前,SYN扩散攻击是最具破坏性的拒绝服务攻击。
- The experiment results show that this solution can defend the SYN Flood attack effectively. 试验结果表明,该方法可以有效抵御SYN Flood攻击。
- In the second section ,we deeply discuss and analyze the theory of SYN Flood attack, memory allocation in TCP 3 hand shakes and different theories of anti this attack, for example ,adoption of syn cookie ,augment of the max value of TCP backlog and etc. . 深入地讨论和研究了SYN Flood的攻击原理,在TCP连接时涉及到的内存分配和和对各种防御方法的机理,如采用SYN Cookie,增加TCP backlog等方法,并对其进行了深入地研究。
- A novel scheme for filtering SYN flooding attack 一种新的过滤SYN洪水攻击的方法
- TCP SYN flood attacks are one type of DDOS attacks that exploit half-open TCP connections to deplete the memory of receiver machines. TCP SYN泛洪攻击是利用半开TCP连接耗尽接收方主机的内存的DDOS攻击的一种。
- The mainly contributions of this paper include these following four aspects: (1) It discusses the attacking principle, attacking mechanism and attacking modes elaborately and provides fundamental references to SYN Cookie scheme against SYN Flood attack. 本文研究的主要贡献在于以下四个方面:(1)对SYN Flood的攻击机制,攻击原理做了细致地分析,为SYN Cookie方案的提出提供了基本的依据。
- Study of Fundamental Principle of TCP SYN Flood Attack 攻击的基本原理研究
- A Method to Detect Syn Flood Attack Based on Patricia Tree 一种基于Patricia树的检测Syn Flood攻击的方法
- Novel Method of Defeding SYN Flooding Attack Based on State-Less Connection Authentication 一种基于无状态连接请求验证的SYN湮没攻击防御方法
- One type of DoS is known as SYN flooding. 一种己知的DoS为传送大量SYN封包。
- SYN flooding attack SYN湮没攻击
- Setting this registry key may expose the server to a SYN flood, denial-of-service attack. 设置此注册表项可能会使服务器面临SYN泛滥和拒绝服务攻击的威胁。
- SYN flooding attacks SYN洪流攻击
- SYN flooding exploits the normal three-way handshake and causes targeted devices to acknowledge to source addresses that will not complete the handshake. 传送大量SYN封包利用正常三向式握手交谈的弱点,让目的地设备一直等待来源端的传送确认,但是此沟通是永远无法完成的。
- Performed prior to a flooding attacks, two days after repotting, then Pentu more humid, with pots easily separated. 换盆之前要浇一次透水,两三天之后再换盆,这时盆土比较湿润,容易与盆分离。
- This paper proposes a way which combines TCP Proxy with the ACK waiting queue to filter DDoS TCP Flooding attacks,and implements it within the Linux kernel. 该文提出了一种TCPProxy与待响应ack队列相结合的、能够对TCP绝拒服务攻击进行有效过滤的方法,并用这种方法在Linux内核中实现了一个高速过滤器。
- It rolls in vast and terrible waves;it accumulates and piles up there;the flood attacks the piles of the bridges as though in an effort to pluck them up with great liquid ropes. 河水经过桥洞时,更是急冲猛泻,掀起可怕的大浪,就在那儿积聚起来,水位暴涨,波浪象根粗水绳那样紧抱桥墩,好象想把它们拔去。
- The flood cut a wide swath in this area. 洪水席卷了这一地区,满目一片疮痍。