IP spoofing

[ɪp ˈspuːfɪŋ]
  • IP spoofing
  • 网络

    IP欺骗;IP电子欺骗;IP地址欺骗

纠错 数据更新时间:2025-11-14 11:46:22
1、

IP spoofing is a common but complex attacking method.

IP欺骗是常用的一种攻击手段。

互联网摘选

2、

IP source address spoofing filtering based on Bloom filter

基于Bloom滤波器的IP源地址假冒过滤

互联网摘选

3、

The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。

互联网摘选

4、

The new method firstly put forward by this paper: the method of preventing IP embezzlement based ARP spoofing, is low cost and easy to implement, and also, it's effectual to various kind of IP embezzlement.

本文独立提出的IP地址防盗用新方法即基于ARP伪装技术的IP地址防盗用解决方案,具有低成本、易实施的特点,而且对各种IP地址盗用的形式都能够防范。

互联网摘选

5、

This paper analyzes the principal of IP spoofing from a theoretical perspective, and provides the common operating procedures and key codes adopted in the unix system to realize IP spoofing.

从理论的角度,分析了IP电子欺骗的原理,并以unix系统作为实例,给出了实现IP电子欺骗的一般步骤及关键代码。

互联网摘选

6、

This paper firstly introduces the knowledge of TCP/ IP and then analyses the principle of IP spoofing in detail.

论文在介绍TCP/IP相关知识的基础上对IP欺骗的原理进行了全面、详尽的分析。

互联网摘选

7、

Technical Analysis and Defence Policy of IP Spoofing

IP欺骗的技术分析及防御措施

互联网摘选

8、

Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

针对常见的IP地址欺骗、IP源路由欺骗、ICMP重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。

互联网摘选

9、

As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。

互联网摘选

10、

Then attack tree is adopted to define coordinated intrusion. Moreover, Z language, a formal language, is employed to depict the attack tree model. Last, a construction of IP Spoofing attack schemas exemplifies this method.

文章首先介绍协同入侵,然后引入攻击树来表示协同入侵,并用形式化语言Z语言描述攻击树模式,最后以IP欺骗攻击为例构造了一个IP Spoofing攻击模式。

互联网摘选

11、

At last, it describes the attack model in Z language, and builds an IP-Spoofing attack model based on IP-Spoofing.

最后,引入形式化语言Z语言来对攻击模式进行描述,并以IP-Spoofing为例构造了一个IP-Spoofing攻击模式。

互联网摘选

12、

This paper made a thorough analysis of the features of network interaction behaviors of normal users and attackers in the DDoS attack based on source IP address spoofing, and then proposes the IP Flow Interaction Behavior Feature ( IBF).

本文深入分析了伪造源IP地址的DDoS攻击中正常用户与攻击者的网络交互行为特征,提出了IP流交互行为特征(IP Flow Interaction Behavior Feature,IBF)的概念。

互联网摘选

13、

Study on IP Spoofing under TCP

TCP下IP欺骗的研究

互联网摘选

14、

The definition of IP spoofing is introduced and the attacking method is analyzed in this paper. Besides, the comprehensive defending strategy is provided to protect WEB site.

介绍IP电子欺骗的涵义,并剖析其攻击方法和手段,在分析其所造成的危害基础上,提出保护WEB站点,抵御其“入侵”的综合防御策略。

互联网摘选

15、

Approach to countermeasures of IP spoofing attack based on UNIX

基于UNIX的IP欺骗式攻击对策研究

互联网摘选

16、

Based on the prediction analysis, the existing IP spoofing could be detected.

通过预测分析,及时检测出已经存在的IP欺骗攻击;

互联网摘选

17、

Other detection methods are based on the statistics of IP addresses and the length of data packets, but their detection accuracy declines rapidly under the IP spoofing attack.

另一些方法基于IP地址和数据报长度的统计特征,但这些方法在IP地址欺骗攻击时检测率急剧下降。

互联网摘选

18、

IP spoofing is one of the commonest attacking means to break through firework.

IP电子欺骗是网络中突破防火墙系统的一种常见的网络攻击方式.

网络文摘精选

19、

The Analysis of the Principle of IP Spoofing

IP欺骗原理分析

互联网摘选

20、

We present countermeasures, including revoking the relation of trust, sniffer software to supervisor, TCP sequence number encryption. The improvement on packet filter to protect against IP Spoofing attack is also proposed.

提出了攻击的防范措施,其中包括撤消信任关系,监听软件进行监测,TCP序列号加密以及改进后的包过滤防火墙防护等方法。

互联网摘选

21、

Analysis of the state under IP spoofing

基于IP欺骗攻击的状态分析法研究

互联网摘选

22、

In this paper the principle of this kind of attack is analyzed, the attack detecting technology and the protecting measures against IP spoofing are also given. And still we discuss the difference between IP spoofing and IP hijacking.

本文分析了这种攻击的实现原理,并提出了针对这种攻击的检测方法和防御技术,另外对IP欺骗和IP劫持进行了比较。

互联网摘选

23、

Lastly, three defensive agents, which are port-scanning agent, sniffer agent and IP spoofing agent are designed in detail in order to explain how to conduct a standardized agent to meet our model objective.

最后,给出的端口扫描、嗅探器和IP欺骗防御代理设计,说明了如何进行标准化的代理设计满足模型目标。

互联网摘选

24、

IP access controller is configured among the local area network, satellite channel and satellite network management device and converts TCP data into request signaling by IP filtering and IP Spoofing.

IP接入控制器配置在IP网络、卫星信道及网络管理设备之间,通过IP过滤、IP欺骗等方法将TCP数据转化为申请信令。

互联网摘选

25、

IP Spoofing Attack: Principles, Methods, Tools and Countermeasures

IP欺骗攻击技术原理、方法、工具及对策

互联网摘选

26、

IP Source Address Spoofing Filtering Based on Scale Free Property of Internet

基于Internet无尺度特性的IP源地址假冒过滤

互联网摘选

27、

This paper analyzes the abstraction of IP Spoofing attack.

分析了IP欺骗式攻击的攻击原理。

互联网摘选

  • 相关词组
  • 今日热词
  • 热门搜索
  • meal[miːl] n.餐,饭;进餐(时间);〈英〉一次挤奶量;谷物粗粉(用作饲料或加工面粉);
  • medium[ˈmiːdiəm] adj.中等的;中间的;不深不浅的;n.方式;媒介;巫师;材料;介质;
  • aula['ɔ:lə] n.第三脑室前端;
  • spoken[ˈspəʊkən] v.讲,谈( speak的过去分词 );说;演说;从某种观点来说;adj.以某种方式说话的;口头的;
  • public[ˈpʌblɪk] n.平民;志趣相投的人;adj.公众的;公共的;政府的;公用的;公开的;公开场合的;;
  • tube china 中国国际管材展览会;第三届中国国际管材展览会
  • transitively['trænsətɪvlɪ] adv.及物地;
  • sorry[ˈsɒri] adj.对不起的;无价值的,低等的;遗憾的;感到伤心的;后悔;int.(道歉时用)很抱歉,请原谅,(请某人重复你没听清的话)你说什么,请再说一遍,(纠正自己说错的话)不对,应该是;
  • rough[rʌf] adj.粗糙的;粗略的;大致的;粗暴的;艰难的;恶劣的;粗野的;汹涌的;高低不平的;不舒服的;猛烈的;不平滑的;不确切的;犯罪盛行的;味道差的n.草图;草稿;暴徒;(高尔夫球场的)长草区;粗野的人
  • boos[bu:z] v.v. (对…)发嘘声,喝倒彩; boo的第三人称单数
  • harbor[ˈhɑːbə] n.海港;海湾;避难所;躲藏处;vt.& vi.心怀;庇护;避入安全地;(船)入港停泊;
  • necktie[ˈnektaɪ] n.领带,领结;

纳米英语英语词典(dict.nm3.cn)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈