首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
15
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(2)
选项
A、methods
B、cases
C、hands
D、sections
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/N2x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2007下项管)业务流程重组的实施步骤包括:项目的启动,拟定变革计划,建立项目团队,重新设计______并实施,持续改进,重新开始。
(2009下项管)根据《计算机软件质量保证计划规范GB/T12504-1990》的规定,为了确保软件的实现满足需求,需要的基本文档不包括______。
(2014上集管)在进行项目详细可行性研究时,将有项目时的成本与无项目时的成本进行比较,求得差额,这种分析方法被称为______。
(2012上集管)某企业信息化建设过程中,决策层要对实施计划方案进行择优和取舍,为保证决策的科学性,其主要决策依据是______。
(2013上项管)分析成本构成结果,找出各种可以相互替代的成本,协调各种成本之间的关系属于______的内容。
(2007上网工)下图为某系统集成项目的网络工程计划图,从图可知项目最短工期为____(1)天,至少需要投入_____(2)人才能完成该项目(假设每个技术人员均能胜任每项工作)。(1)
(2006上系分)GB/T24001-1996环境管理体系一规范idtISO14001表示______国际标准的我国标准。
(2006下网工)在TCP/IP体系结构中,BGP协议是一种______(1),BGP报文封装在______(2)中传送。(1)
(2012下项管)某实验室准备建立一个由20台计算机组成的局域网。为节约费用,适宜采用通用的______(1)技术,采用交换机式HUB和双绞线进行组网,其网络拓扑结构为_____(2),HUB与微机工作站之间的最长距离为_____(3)米。(3)
(2014下项管)当千兆以太网使用UTP作为传输介质时,限制单根电缆的长度不超过______(1)米,其原因是千兆以太网______(2)。(1)
随机试题
绘制冬至日太阳光照示意图(要求:画出南北回归线、南北极圈、晨昏线、太阳光线),并简要说明运用该图进行讲解的教学要点和教学意义。
某工程资料如下表所示:(1)画出其网络图;(2)求出每个工作的完成时间;(3)给出关键路线并计算工程完工期。
我国刑法分则对犯罪进行分类的主要依据是()
脑脊液中氯化物显著减少最常见于的疾病是
土地权利转移较常见的具体服务内容有()。
按规定,临时用电设备在5台及其以上或者设备总容量在( )及其以上者,均应编制临时用电施工组织设计。
中国公民范某为某上市公司的部门经理并兼任本公司董事,2017年取得下列收入:(1)每月工资11000元,个人需负担社保及住房公积金1000元。11月取得董事费20000元,12月末一次性取得年终奖36000元:(2)转让限售股取得收入800000元
ModernlorehasitthatinEnglanddeathisimminent,inCanadainevitableandinCaliforniaoptional.Smallwonder.Americans’
Toitsfans,itisaddictive.Tothemedia,itisapromisingmoney-maker.Sudoku,anoldpuzzlelongpopularinJapanisfastg
A、Fashionschangeovertime.B、Menarethriftierthanwomen.C、Skirtsandshoesaremoreimportantthanotherclothing.D、Somecl
最新回复
(
0
)