1) black hole attack

黑洞攻击
1.
The black hole attack of AODV routing protocols was simulated with NS-2.

33分析并仿真了AODV路由协议的黑洞攻击;结合已存在的黑洞防御方案,给出了一种新的解决方案;最后提出了一种新的对无线自组织网络造成威胁的攻击方法。
2) passive black hole attack

被动型黑洞攻击
1.
This paper compares several attack models aiming at mobile Ad Hoc network\'s prosperity of routing vulnerable,and presents a classification that divides black hole attacks into two specific types,such as passive black hole attacks and active black hole attacks under Dynamic Source Routing(DSR) protocol.
在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。
3) active black hole attack

主动型黑洞攻击
1.
This paper compares several attack models aiming at mobile Ad Hoc network\'s prosperity of routing vulnerable,and presents a classification that divides black hole attacks into two specific types,such as passive black hole attacks and active black hole attacks under Dynamic Source Routing(DSR) protocol.
在NS2网络仿真平台上实现包括RREQ洪泛攻击、被动型黑洞攻击和主动型黑洞攻击在内的3种攻击模式。
4) wormhole attack

虫洞攻击
1.
Detecting Wormhole Attacks in Multi-path Ad Hoc Networks

检测多径路由Ad Hoc网络中的虫洞攻击
2.
Basic wormhole attack and accordance wormhole attack problems were analyzed, based on which proposed an attack detection scheme.
针对基于TDoA测距的定位技术,分析了基本虫洞攻击与一贯虫洞攻击的特点,提出了一种利用无线多跳网络时空特性与测距数据一致性性质的攻击检测方法,并从理论上给出了此方法的成功检测攻击概率下限值。
3.
This article presents the characteristics of wireless sensor networks,analyzes the roots of the security issues,and then describes in detail the theory of wormhole attack and its destructions.
文章首先介绍了无线传感器网络的特征,分析了安全问题的根源,然后详细介绍了无线传感器网络中虫洞攻击的原理和破坏性,提出引入简化的marsh信任模型,将邻居节点以往表现作为信任评估的经验来源,通过具体分析确定节点的位置关系,从而避免传感器网络中的虫洞攻击,最后指出了下一步研究的方向。
5) gray holes

灰洞攻击
6) hacker attack

黑客攻击
1.
It cannot defend attacks as illegal invade,hacker attack,secret in.

互联网是一个面向大众的、开放的网络 ,对于信息的保密和系统的安全等方面考虑得不很完备 ,对于非法侵入、黑客攻击、保密性数据泄露等安全问题难以防范。
2.
This article introduces the fundamental mode of hacker attack,proposes the emergency response countermeasure,elaborates the invasion examination system with emphasis(IDS) and the technology of computer evidence collection,and puts forward its own idea to the constructing and system composing of network security management platform.
介绍了黑客攻击的主要方式,提出了应急响应的对策,重点论述了入侵检测系统(IDS)和计算机取证技术,并对网络安全管理平台的构建和系统组成提出了自己的思路。
3.
Security problem at present in the computer network exists which through the elaboration, has analyzed the hacker network attack general step, and has carried on the discussion and the analysis in this foundation in view of the network hacker attack concrete preventive measure.
通过阐述目前计算机网络中存在的安全问题,分析了黑客网络攻击的一般步骤,并在此基础上针对网络黑客攻击的具体预防措施进行了讨论和分析。
补充资料:被动
①待外力推动而行动(跟‘主动’相对):工作要主动,不要~。②不能造成有利局面使事情按照自己的意图进行(跟‘主动’相对):由于事先考虑不周,事情搞得很~。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条