首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extens
admin
2018-05-26
28
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment
(1)
(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other
(2)
,the attacker inserts a large amount of
(3)
packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,all
(4)
who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network elements.For instance,a single Long Term Evolution(LTE) eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device
(5)
the network.
(4)
选项
A、user
B、administrator
C、editor
D、attacker
答案
D
解析
转载请注明原文地址:https://www.kaotiyun.com/show/GgTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2010上集管)某软件开发项目的实际进度已经大幅滞后于计划进度,______能够较为有效地缩短活动工期。
(2012下集管)甲软件系统每年因故障中断10次,每次恢复平均20分钟,乙软件系统每年因故障中断2次,每次恢复平均5小时,根据《软件工程产品质量GB/T16260-2006》中可靠性和有效性(或可用性)的定义,下面说法正确的是______。
(2013上集管)根据《软件工程产品质量GB/T16260-2006》,在下列信息系统的设计方案中,主要用于提高系统可靠性的方案是______。
(2006上系分)在关于数据挖掘的描述,正确的是______。
(2014下集管)在信息系统工程总体规划过程中,软件架构包括多种形式。在______中,数据和数据处理放在服务器端,而应用处理和表现层放在客户端。
(2011下集管)某系统集成公司制订了一系列完备的质量管理制度,其中一项是要求每个项目在各个阶段的最后都必须进行质量审计。这种审计活动是______过程的一部分工作。
(2014上项管)OSI安全体系结构定义了五种安全服务,其中_____(1)用于识别对象的身份并对身份核实。______(2)用于防止对资源的非授权访问,确保只有经过授权的实体才能访问受保护的资源。(2)
(2013上项管)攻击者通过搭线或在电磁波辐射范围内安装截收装置等方式获得机密信息,或通过对信息流量和流向、通信频率和长度等参数的分析推导出有用信息的威胁称为______。
()isthetechnologythatappearstoemulatehumanperformancetypicallybylearning,comingtoitsownconclusions,appea
2017年7月8日,《国务院关于印发新一代人工智能发展规划的通知》中涉及了人工智能的几个基础理论,其中,_____________研究统计学习基础理论、不确定性推理与决策、分布式学习与交互、隐私保护学习等学习理论和高效模型。
随机试题
男,55岁。右胸闷气3个月,胸痛15天,夜间重,查体:颜面及颈部,胸壁略肿胀,胸壁静脉曲张,腋下有一拇指大小的淋巴结,无压痛,活动尚好,心率110次/分,律整,右肺呼吸音消失。为明确诊断需要哪项检查()
子宫内膜的周期性变化不包括
铅当量的单位是
诊断牙槽突骨折最有力的证据是()
管理层次与管理跨度之间的关系是()。
李某户籍所在地为A市甲区,经常居住地为A市乙区。其到B市甲区出差,因酒后殴打他人,被B市甲区公安分局处以行政拘留10天,关押在位于B市乙区的市拘留所。若李某不服,欲提起行政诉讼,()有管辖权。
2001年10月,我国全面启动了行政审批制度改革工作。十多年来,国务院部门和各省区市大幅精简行政审批项目,经过多轮取消和调整,行政审批项目削减了近七成。但是,依旧存在的重审批轻监管、管理随意性大、权力滥用风险突出等问题,特别是日益凸显的“权力寻租”现象,引
下列关于法律实施和法律实现的表述,能够成立的是()。
Thevisualartsareaclassofartforms,includingpainting,sculpture,photography,andothersthatfocusesonthecreationo
Mostvolcanoesarequiet.Theyrest(36)______forhundredsofyears.Noonepaysmuchattentiontothem.MountSt.Helenswaso
最新回复
(
0
)