Replay Attacks

美 [ˈriːpleɪ əˈtæks]英 [ˈriːpleɪ əˈtæks]
  • 网络攻击回放
Replay AttacksReplay Attacks
  1. Research and Taxonomy of Replay Attacks on Security Protocol

    对安全协议重放攻击的分类研究

  2. This paper also optimizes the design to prevent replay attacks basis of the original schemes .

    本方案还在原有类似方案的基础上,在防止重放攻击方面作了优化设计。

  3. Design and Implementation of Scheme for Avoiding Replay Attacks

    抗重播攻击方案的设计与实现

  4. Furthermore , we analyze its efficiency and its ability to resist replay attacks .

    然后分析了该协议抵抗重放攻击的能力和运行效率。

  5. You can use replay attacks to create data integrity issues as well as denial-of-service attacks .

    重播攻击可用于造成数据完整性问题以及拒绝服务攻击。

  6. The security analysis shows the solution can resist message replay attacks and man-in-the-middle attack effectively .

    安全分析表明,该方案能有效地抵御消息重放攻击和中间人攻击。

  7. As the message submitted by users varies randomly , the scheme can prevent replay attacks from taking place effectively .

    由于每次用户提交的认证信息都是动态可变的,从而有效地防止了回放攻击。

  8. Nonce is required to prevent replay attacks .

    需要Nonce以防止重播攻击。

  9. This paper brings forward a novel taxonomy of replay attacks after study the attribute of replay attacks to various protocols .

    重放攻击是对协议的攻击中危害最大、最常见的一种攻击形式。

  10. Also Mobile IP technique brings potential secure problems , one of which is registration suffering denial of service attacks and replay attacks .

    另外,移动IP也带来了潜在的安全问题,其中注册过程可能遭受拒绝服务攻击和重放攻击。

  11. A scheme of avoiding replay attacks which utilizes some techniques about Random and Public-Key Cryptography is presented and designed .

    这篇文章针对重播攻击,设计并实现了一种利用随机数和公钥密钥学的技术来防范攻击的方案。

  12. There are subtle issues of cryptography , replay attacks , and various other forms of attack that are easily overlooked .

    加密、重播攻击和其中各种形式的攻击中有各种细微问题容易被忽视。

  13. When used in conjunction with nonce and timestamp checking , this can effectively thwart replay attacks .

    将nonce与时间戳检查一起使用时,可以有效地阻止回复攻击。

  14. In this paper , based on authentication protocols against replay attacks and type flaw attacks , they are studied by non-formal and formal ways .

    本文以基于抗重放攻击和类型缺陷攻击的认证协议为研究对象,从非形式化和形式化两个方面进行研究。

  15. There are many kinds of ways of attacks on authentication protocol , but replay attacks and type flaw attacks account for more than 90 percent of them .

    对认证协议的攻击形式有很多,但已构成的攻击事例中,百分之九十以上是重放攻击和类型缺陷攻击。

  16. The ARAN protocol is analyzed by the extended theory of strand spaces and two security vulnerabilities are found , that is conspiracy and replay attacks .

    使用扩展的串空间理论分析了ARAN路由协议的安全性,发现了该协议存在重放和合谋两种攻击。

  17. While the ID is randomly generated , it is still subject to replay attacks because it does not timeout ( except when idle ) .

    虽然该ID是随机生成的,但是它仍然受重播攻击的影响,因为它没有超时(除非处于空闲状态)。

  18. SPAS is resistant to DoS attacks , replay attacks , impersonation attacks , and stolen-verifier attacks .

    指出了以往类似协议中存在的攻击问题,并分析了SPAS的安全性,指出SPAS能够抵御拒绝服务攻击、重放攻击、冒充攻击、服务器端验证信息泄密后的攻击。

  19. The analysis of security for the cryptography demonstrates the cryptography can resist the message replay attacks and man in the middle attacks , and is feasible in practice .

    对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并在实际应用中有较高的可行性。

  20. Against possible network attacks , using the appropriate security policy . For example , for network packet replay attacks on the data of authentication , it sets expiration time to increase security .

    针对可能发生的网络攻击,采用了相应的安全策略,例如对认证的数据包重放攻击,设置数据过期时间以提高安全性。

  21. SAML provides protection from replay attacks by requiring the use of SSL encryption when transmitting assertions and messages specifically to prevent interception of assertions .

    SAML提供了避免重播攻击的保护。SAML要求在传输断言和消息时使用SSL加密,以专门防止断言被拦截。

  22. The protocol can prevent possible acts of plagiarism in the OMA DRM v2 effectively , as well as Denial of Service attacks and replay attacks .

    协议的实现,有效防止了OMADRMV2中可能存在的剽窃行为,以及DoS(denialofservice)拒绝服务攻击和重放攻击。

  23. The security technology decides the realization of the mobile agent . The primary problem solved by this paper is to prevent replay attacks and acts beyond its authorities of malicious mobile agent .

    安全技术决定了MobileAgent的实用性,其主要解决的问题是防范恶意MobileAgent的重复攻击和越权攻击。

  24. The scheme canot only against personating STA , AP and AS and messages replay attacks , but also can against DoS attacks effectively .

    新机制不仅能有效防范STA、AP、ASU的假冒、消息重放等攻击,还具有很强的抗击拒绝服务攻击的能力。

  25. A simple hash , as sometimes used in HTTP Basic authentication , is subject to replay attacks because one can easily sniff the traffic and replay the hash without knowing the password .

    简单的哈希(例如有时在HTTP基本身份验证中使用的哈希)易受到回复攻击的威胁,因为攻击者可以很容易地探查到通信并能够在不知道密码的情况下回复哈希。

  26. Based on the introduction of security mechanism of the WiMAX system , this paper analyzes the mechanism and points out its security problems : the PKM authority protocol is vulnerable to forgery and replay attacks ;

    文章在介绍WiMAX所采用的安全机制的基础上,对WiMAX安全机制进行了分析,发现它存在安全漏洞:WiMAX的PKM授权协议很容易遭受伪造攻击和重放攻击;

  27. Because a signature alone does not guarantee that the sender is who they say they are , the message transmission is vulnerable to techniques such as replay attacks by some malicious third party .

    因为仅仅有数字签名并无法保证发送方就是他们自己所声称的人,消息的传输很容易遭受恶意第三方诸如再现攻击等技术的袭击。

  28. In addition , this paper improves the security of the Merkle authentication tree signature which should not resist an attacker to replay attacks . A dynamic Merkle authentication tree signature scheme is presented .

    此外,本文在安全性上改进了Merkle可信树数字签名不能抵抗攻击者进行重放攻击的缺陷。

  29. Therefore , the mobile RFID system faces with traditional security threats such as forgery , eavesdropping , replay attacks , tampering with information in tags , and the ability of tracking targets is more likely to cause serious privacy problems .

    因此移动RFID系统面临着诸如伪造、窃听、重放攻击、标签信息篡改等传统安全威胁,其目标跟踪功能更可导致严重的隐私保护问题。

  30. Through adding the fresh factors and some signs on the principals into the message , the inference rules of the meaning of message in BAN logic are improved . So it makes abilities to analyze replay attacks and type flaw attacks on authentication protocols enhanced in the BAN logic .

    对BAN逻辑的消息含义推理规则进行改进,增加新鲜性因素和主体识别标号,从而能使BAN逻辑在分析认证协议的重放攻击和类型缺陷攻击方面的能力有所加强。