首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
18
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(2)
选项
A、methods
B、cases
C、hands
D、sections
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/N2x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2009上软评)软件可靠性的理解,正确的是______。①软件可靠性是指在指定条件下使用时,软件产品维持规定的性能级别的能力;②软件可靠性的种种局限是由于随着时间的推移,软件需求和使用方式发生了变化;③软件可靠性包括成熟性、
(2011下项管)根据《软件工程产品质量第1部分:质量模型GB/T162601-2006》,在规定条件下,相对于所用资源的数量,软件产品可提供适当性能的能力称为软件产品的______。
(2013上集管)根据《软件工程产品质量GB/T16260-2006》,在下列信息系统的设计方案中,主要用于提高系统可靠性的方案是______。
(2013上集管)某政府部门需要改造现有信息系统,目前正在开展项目立项工作,该项目经初步投资估算确定的投资额为950万,而项目可行性研究报告,得到批复确定为890万。这种情况下建设单位恰当的做法是______。
(2014上集管)对变更效果的评估是变更管理中非常重要的一环。______不属于变更效果评估的内容。
(2009上项管)关于系统建设项目成本预算,下列说法中不正确的是______。
(2013上项管)分析成本构成结果,找出各种可以相互替代的成本,协调各种成本之间的关系属于______的内容。
(2005下监理)已经发布实施的标准(包括已确认或修改补充的标准),经过实施一定时期后,对其内容再次审查,以确保其有效性、先进性和适用性,其周期一般不超过______年。
(2005下项管)为了保障数据的存储和传输安全,需要对一些重要数据进行加密。由于对称密码算法______(1),所以特别适合对大量的数据进行加密。国际数据加密算法IDEA的密钥长度是______(2)位。(2)
随机试题
新事物之所以必然战胜旧事物,从根本上说是由于()
急性化脓性胆囊炎时,最易穿孔的胆囊部位是
以下说法正确的是()
目前,我国回转型设备及高塔体安装过程中的同轴度测量控制常采用()。
汽轮机按热力特性可以划分为()等。
A机电安装公司承包了某电厂30000m室外压力管道的安装工程,工期很紧,而且施工期间阴雨较多。项目部为了保证工程质量,把室外压力管道安装分为原材料检验、管架制作安装、管道预制、管道安装、管道焊接、管道试验、管道保温、管道吹扫等工序,按照对整体质量影响的
下列关于地理教案编写步骤的表述不正确的是()。
Byfarthemostcommondifficultlyinstudyissimplefailuretogetdowntoregularconcentratedwork.Thisdifficultyismuch
根据我国《宪法》的规定,下列选项中不属于公民获得物质帮助的条件的是()。
下列程序的输出结果是【】。#inClude<iostream>usingnamespacestd;intmain(){inti=5;int&r=i;r=7;cout<<
最新回复
(
0
)