There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an
attacker sends an extensive amount of connection establishment(1)(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other(2),the attacker inserts a large a mount of(3)packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,an(4)who gains access to DPS can artificially generate lots of random pcket-in flow request messages to saturate the control channel and the controller resources. Moreover,the lack of diversityamong DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoSattacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance,a single Long erm Evilution(LTE)eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the network.
A、methods
B、cases
C、hands
D、sections
A.EIGantal
B.DES
C.MDS
D.RSA
A.时间戳
B.nonce
C.明文填充
D.序号
A.溢出攻击
B.钓鱼攻击
C.邮件炸弹攻击
D.拒绝服务攻击
A.拒绝服务攻击
B.欺骗攻击
C.窃听攻击
D.数据驱动攻击
A.预防
B.检查
C.威慑
D.修正
A.机密性
B.可用性
C.完整性
D.真实性
A.证书主体
B.使用证书的应用和系统
C.证书权威机构
D.AS
A.128
B.160
C.256
D.512
A.COM类型
B.HTML类型
C.SYS类型
D.EXE类型
A.资产识别
B.威胁识别
C.风险识别
D.脆弱性识别
A.防火墙技术
B.数据备份技术
C.入侵检测技术
D.访问控制技术
A.采用物理传输(非网络)
B.信息加密
C.无线网
D.使用专线传输
A.发现加密算法
B.发现密钥或者密文对应的明文
C.发现解密算法
D.发现攻击者
A.IPSec
B.PPTP
C.GRE
D.IPv4
A.证书管理
B.证书签发
C.证书加密
D.证书撤销
A.版本号
B.签名算法标识
C.加密算法标识
D.主体的公开密钥信息
A.内存扫描
B.模式匹配
C.定理证明
D.模型检测