分布式拒绝服务攻击

  • 网络DDoS;distributed denial of service;Distribution Denial of service;ddos attack;distributed denial of service attack
分布式拒绝服务攻击分布式拒绝服务攻击
  1. 基于模糊理论的分布式拒绝服务攻击检测

    DDoS flood attacks detection based on fuzzy theory

  2. 布隆过滤器,能有效的减少存储空间,并且其存储空间固定,可以避免分布式拒绝服务攻击对动态存储结构的潜在威胁。

    Bloom filter can effectively reduce the storage space and the fixed storage can avoid the potential threat of the DDoS attacks on the dynamic storage structure .

  3. 分布式拒绝服务攻击对Internet服务存在巨大威胁。

    DDoS attack poses great threat to Internet service .

  4. IP追踪是防御分布式拒绝服务攻击的重要方法。

    IP traceback is an important way to defend against distributed denial of service attack .

  5. 数据包抽样标记技术是为了应对分布式拒绝服务攻击而提出的一种IP追踪技术。

    Probabilistic Packet Marking for IP Traceback was proposed to defend against distributed denial-of-service attacks .

  6. 一种改进的TCP分布式拒绝服务攻击防御方法

    An Enhanced Defence Method for TCP DDoS Attack

  7. 针对TCP协议的分布式拒绝服务攻击的防范方法研究

    Research on Defense Against TCP-based Distributed Denial-of-Service Attack

  8. 分布式拒绝服务攻击(DDoS)是Internet面临的最严峻的威胁之一。

    DDoS Distributed Denial of Service is one of the most severe threats to Internet .

  9. 提出一种基于Web用户访问行为的异常检测方案,用于检测应用层上的分布式拒绝服务攻击,并以具有非稳态流特性的大型活动网站为例,进行应用研究。

    This paper proposes an anomaly detection based on Web user access behavior for the defense of application layer Distributed Denial-of-Service ( DDoS ) attack .

  10. 基于统计分析和流量控制的DNS分布式拒绝服务攻击的检测及防御

    Detecting and Defending DNS DDoS Attacks Based on Statistical Analysis and Flow Controls

  11. 分布式拒绝服务攻击(distributeddenial-of-service,DDoS)已经对Internet的稳定运行造成了很大的威胁。

    Distributed denial-of-service attack ( DDoS ) brings a very serious threat to the stability of the Internet .

  12. TCPSYN分布式拒绝服务攻击分析

    The Analysis of DDoS Attack for TCP SYN

  13. SYNFlood攻击是当前最流行的DoS(拒绝服务攻击)与DDoS(分布式拒绝服务攻击)的攻击方式之一。

    SYN Flood attack is one of the most popular Dos and DdoS attack ways .

  14. 黑客攻击机制与防范分布式拒绝服务攻击(DDoS)原理与防范

    Principle and Prevention of Hacker Attack Mechanism of DDoS attack and its prevention

  15. 基于SYNCookie下防分布式拒绝服务攻击算法的分析与实现

    Analysis and realization of anti-DDoS attack algorithm based on the SYN Cookie mechanism

  16. 分布式拒绝服务攻击(DDoS)原理及其防范措施

    Principle and Prevention Measures of DDoS Attack

  17. 拒绝服务攻击(DoS)以及分布式拒绝服务攻击(DDoS)是目前严重影响网络安全和网上服务质量的一种常用攻击手段。

    Currently , DoS and DDoS attack , common attacks at network , are great threat to security and QoS of network .

  18. 但是由于MANET网络中节点和网络资源都很有限且节点不可信,所以特别容易受到分布式拒绝服务攻击(distributeddenial-of-Service,DDoS)。

    The resource of MANET is rear and nodes can not be trusted , so MANET is particularly vulnerable to DDoS ( Distributed Denial-of-Service ) attack .

  19. 提出了一种应用于路由器的嵌入式DDoS(分布式拒绝服务攻击)防御算法。

    A new embedded algorithm for defeating DDoS ( distributed denial of service ) is proposed , which can be applied in a router .

  20. 本文通过对网络安全及分布式拒绝服务攻击进行研究,提出了一种新的基于流量的SYNFlooding攻击定位及防御算法。

    We study the network security and Distributed Denial of Service and proposed a novel algorithm of SYN Flooding attack source orientation & defense based on network traffic in this paper .

  21. 拒绝服务攻击(DoS),特别是分布式拒绝服务攻击(DDoS)已经成为网络服务甚至是网络本身的一个巨大威胁。

    The Denial of Service attack , especially the Distributed denial of service ( DDoS ) attack is a grave threat to Internet services and even to the network itself .

  22. 当前,分布式拒绝服务攻击(DDoS)已经成为信息安全的一个重大威胁,僵尸网络(Botnet)为发动DDoS攻击提供了方便。

    At present , distributed denial of service ( DDoS ) attacks has become a major threat to the information security . Botnet provided a convenience to launching DDoS attacks .

  23. 通过分析分布式拒绝服务攻击(DistributedDenialOfService,DDOS)的特点,提出一种基于主机负载-并发连接时间序列预测的DDOS攻击检测方法。

    By analyzing of the features of distributed denial of service ( DDOS ) attacks , a novel approach of detection of DDOS attacks based on host load-concurrent connection time series prediction is proposed . This method has improved the traditional anomaly detection .

  24. 文章根据分布式拒绝服务攻击(DDoS)的本质特点,提出了一种基于隐马尔可夫模型(HMM)的DDoS攻击检测方法。

    On the basis of the inherent feature of distributed denial of service ( DDoS ) attacks , a novel approach of detection of DDoS attacks based on hidden Markov model ( HMM ) is proposed .

  25. 分析发现P2P协议在校园网应用中存在版权问题、病毒与蠕虫问题和占用大量带宽等问题,但其也能防御分布式拒绝服务攻击(DDOS攻击)。

    Analysis showed that application of P2P protocols exist in the Campus Network copyright issues , problems and viruses and worms , and other bandwidth-intensive , but it can also be a distributed denial of service attack defense ( DDOS attack ) .

  26. 近年来,全球互联网络频繁遭受网络安全威胁事件频发,互联网上流行的网络安全事件种类繁多,包括蠕虫、扫描、恶意代码、网页挂码、分布式拒绝服务攻击(DDoS,DistributedDenialOfService)等。

    In recent years , network attack events threat the internet network security frequently . There are a popular variety of network security incidents in the internet , like worm , scan , malicious code , page-linked code and DDoS ( Distributed Denial of Service ) and so on .

  27. 僵尸网络是互联网上受到黑客集中控制的一群计算机,往往被黑客用来发起大规模的网络攻击,如分布式拒绝服务攻击(DDoS)、海量垃圾邮件等。

    Botnet is a group of computers centralized controlled by the hackers . It is often used by hackers to launch a large-scale network attacks , such as distributed denial of service attack ( DDoS ) and massive spam .

  28. 之前,蜥蜴小组称,它计划采用分布式拒绝服务攻击(或称DDoS)在圣诞节攻击游戏服务公司,这种方式会导致服务器用量大增,直至不堪重负而瘫痪。

    Lizard Squad said earlier that it planned to attack the gaming services on Christmas with a distributed denial of service , or DDoS , attack , in which servers are flooded with Internet traffic until they collapse under the load .

  29. 通过对各种攻击形式及防御措施分类的讨论,指出了检测技术在DDoS攻击防御中的重要作用和意义,并在此基础上给出了一种基于IP流特性的分布式拒绝服务攻击检测方法。

    Through the discussion of a variety of attacks and different classes of defensive measures , the important role and significance of DDoS attack detection technology in defending DDOS attacks are pointed out . A detection method against DDoS attacks based on the characteristics of IP flow is given .

  30. 具体讨论了该机制的3种典型的实施方式:目的网络的准入控制,基于移动通信网的虚拟局域网(VLAN)访问服务和防止源自移动通信网的分布式拒绝服务攻击。

    Three typical applications , Network Admission Control ( NAC ), Virtual Local Area Network ( VLAN ) visiting service based on mobile telecommunication network , and Prevention on Distributed Denial of Service ( DDoS ) attack from mobile telecommunication network , was discussed specifically .