首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
29
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(2)
选项
A、methods
B、cases
C、hands
D、sections
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/UgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2005下项管)______是进度控制的一个重要内容。
(2011下项管)绩效评估实施过程的首要任务是______。
(2014上集管)在进行项目详细可行性研究时,将有项目时的成本与无项目时的成本进行比较,求得差额,这种分析方法被称为______。
(2010上项管)某企业针对“新一代网络操作系统”开发项目进行可行性论证。在论证的最初阶段,一般情况下不会涉及到______。
(2013下项管)以下关于商业智能的说法中,______是不恰当的。
(2010上项管)近年来,电子商务在我国得到了快速发展,很多网站能够使企业通过互联网直接向消费者销售产品和提供服务。从电子商务类型来说,这种模式属于______模式。
(2013上集管)某企业的管理系统已进入试运行阶段,公司领导在试用该系统时认为他使用的出差报销表格的栏目设置不合理,便电话要求负责系统建设的项目经理修改,根据变更管理的要求,项目经理正确的做法是______。
(2010上监理)支持较高传输速率的无线网络协议是______。
(2014上项管)以下关于工作分解结构(WBS)的说法中,______是正确的。
(2014下项管)当千兆以太网使用UTP作为传输介质时,限制单根电缆的长度不超过______(1)米,其原因是千兆以太网______(2)。(1)
随机试题
公共场所彰显以人为本的情怀,亦需以文明的形象来守护这良好氛围。“蹭凉”须有度,“蹭凉族”应()“公地”与“私域”的边界,遵循最起码的文明规范,这既是对提供纳凉场所的尊重,也是对自身文明素养的一种(),切莫因“蹭凉”而
十进制数0.6875转换为二进制数为_______。
经产妇,末次月经不详,超声测量胎囊最大直径是1cm,计算孕龄是
某化合物的结构式为,该有机化合物不能发生的化学反应类型是:
某公司有一投资项目,需要投资6000万元(5400万元用于购买设备,600万元用于追加流动资金)预期该项目可使企业销售收入增加:第1年为2000万元,第2年为3000万元,第3年为5000万元,第3年末项目结束,收回流动资金600万元。假设公司适用的所得税
企业折价购入债券时,投资者各期实得的投资收益是()。
下列()属于对食品安全事故的行政处理措施。
实现社会主义现代化和中华民族伟大复兴,是坚持和发展中国特色社会主义的()
Autocrasheshavedecreasedinrecentyears,butthenumberofdeathsincrashesstillaveragesaround40,000everyyear.Amuch
A、1,101,864.B、1,101,468.C、1,110,684.D、1110864A
最新回复
(
0
)