首页
登录
从业资格
There are different ways to perform IP b
There are different ways to perform IP b
题库
2022-08-02
99
问题
There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment()(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other(),the attacker inserts a large amount of()packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,an()who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels fuels the fast propagation of such attacks. Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network element.For instance,a single Long Term Evilution(LTE)eNodeB?is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device()the network.问题1选项A.messageB.informationC.requestD.date问题2选项A.methodsB.casesC.handsD.sections问题3选项A.badB.casesC.fakeD.new问题4选项A.orB.administratorC.editorD.attacker问题5选项A.orB.ofC.inD.to
选项
答案
CBCDA
解析
译文:有许多种方法去执行基于IP的DoS攻击。最常见的基于IP的DoS攻击的一种方式是攻击者发送广泛数量的连接请求(例如TCP SYN请求)用控制器或者数据从处理系统去建立悬挂连接。攻击者能毁灭可以被合法用户利用的网络资源。在其他情况下,攻击者添加了大量的伪装数据包,这些传入信息包将触发,并向网络控制器发送大量的packein流请求消息这些进入的工作包会引发table-misses和发送许多packet-in请求信息到网络控制器使控制器资源饱和。在有些情况中,攻击者获得进入DPS可以获得许多工作包请求信息去渗透控制渠道和控制器资源。此外,DPS多样性的缺乏会激起最快的攻击扩散。移动回程设备是固有的可以阻止由于复杂和特定供应商设备攻击的传播。此外,遗留的回程设备不需要频繁地与核心控制设备进行通信,类似于DPS与集中式控制器通信的方式。这些特性最小化了DoS攻击的影响和传播。此外,移动回程设备被控制为多个网络元素的共同努力。例如,一个单一的长时间的清除(LTE)eNodeB连接到32个MMEs。因此,DoS/DDoS攻击一个单一的核心元素不会终止回程设备或网络的整个操作。
转载请注明原文地址:https://www.tihaiku.com/congyezige/2414692.html
本试题收录于:
中级 信息安全工程师题库软件水平考试初中高级分类
中级 信息安全工程师
软件水平考试初中高级
相关试题推荐
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
Qualitycontrolisnormallyperformedby
( )isnotincludedinPerformIntegrat
Thecostperformanceindex(CPI)isther
()isnotincludedinPerformIntegrate
随机试题
Oneofthesimplestandbestknownkindsofcrystalistheionicsalt,ofwh
卵泡基本结构是A.有颗粒层和卵丘 B.中央有一卵泡腔 C.由卵母细胞和卵泡细
档案鉴定人员在判定档案价值时必须考虑保管费用因素,所谓保管费用,是指对以后保管档
以下哪项不属于施工图设计文件所必须包括的内容?()A.合同所要求的各专业设计
针对乙型肝炎病毒的说法错误的是()A:核心抗体HBcAbIgG可持续阳性多年
患者,男性,52岁。有慢性乙型肝炎病20余年,近半年感觉恶心,食欲不振,乏力伴肝
杏仁的炮制作用为()。A.促进酶解反应B.使苦杏仁内服后迅速释放出足量的氢氰酸
某社会工作服务机构根据社区老年人的需求,设计了一个以维护老年人财产权益为目标的服
参与受体型TPK-Ras-MAPK途径的分子有( )。A.Ras蛋白 B.G
下列工作中,属于创造项目产品过程的有()。(新教材已删除)A.项目策划 B.
最新回复
(
0
)