首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
33
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(1)
选项
A、message
B、information
C、requests
D、data
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/TgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012下项管)在企业业务流程管理和重组过程中,及时和有效的评估是企业重要的学习途径。良好评估的基础是必须建立有效、公开、公认和公平的评估标准、评估指标和评估方法。评估标准和指标来源于公司的业务目标和流程要求,评估的方法主要关注______。
(2014上集管)根据《计算机软件质量保证计划规范GB/T12504-1990》规定,为确保软件的实现满足需求,需要一些基本的文档。______不属于基本文档。
(2008下系分)某公司支出20万元购买了某市场预测信息,由于此信息的采纳,某公司多得到了100万元的利润,对某公司而言,这个市场预测信息的______。
(2011下项管)下列描述中,______不是软件体系结构研究的内容。
(2012上网工)802.11在MAC层采用了______协议。
(2008上系管)运行Web浏览器的计算机与网页所在的计算机要建立______(1)连接,采用______(2)协议传输网页文件。(1)
(2010下网工)使用PERT图进行进度安排,不能清晰地描述______(1),但可以给出哪些任务完成后才能开始另一些任务。下面PERT图所示工程从A到K的关键路径______(2)(图中省略了任务的开始和结束时刻)。(2)
(2007下监理)局域网中使用的传输介质有双绞线、同轴电缆和光纤等。10BASE-T采用3类UTP,规定从收发器到有源集线器的距离不超过______(1)米。100BASE-TX把数据传输速率提高了10倍,同时网络的覆盖范围______(2)。(2)
(2008下项管)关于RSA算法的叙述不正确的是______。
Thecostperformanceindex(CPI)istheratioofearnedvalueto()andcanbeusedtoestimatetheprojectedcostofcompleting
随机试题
阅读韩愈《张中丞传后叙》中盼一段文字,然后回答下列小题。愈尝从事于汴、徐二府,屡道于两府间,亲祭于其所谓双庙者。其老人往往说巡、远时事,云:南霁云之乞救于贺兰也,贺兰嫉巡、远之声成功绩出己上,不肯出师救。爱霁云之勇且壮,不听其语,强留之,具食与乐
微小听神经瘤直径:
张三、李四、王五、赵六、周七五人为研究生同学。2009年7月份研究生毕业时,五人商议欲创立一家经营法律类图书的华星英杰有限责任公司。五人订立了设立公司的协议,约定张三以遗嘱继承的其祖父所留给他的临街的一处二层商业房作为出资;李四以货币作为出资;王五以其草原
企业内部控制应遵循的原则有()。
以下说法正确的是()。
当某教师在课堂时,学生不声不响,而当该教师离校或离开课堂以后,纪律立即松懈。与这种课堂纪律有关的教师领导方式类型最可能是()
《三国演义》是明初罗贯中创作的历史演义小说,它取材于东汉末年和魏、蜀、吴三国鼎立的一段历史,为那个群雄逐鹿的动荡时代提供了全景式的历史图卷,创造了数以百计的栩栩如生的人物画廊。最能准确复述这段话主要意思的是()。
关于药品,下列说法错误的是()。
WhatdidNicholasdoattwo?
Researchshowsthateveryonedreamsquitefrequentlyeverynight.Weusuallyrememberjustthelastdreamthatwehadbefore【1】.
最新回复
(
0
)