首页 / 词典 / good

spoofing

美 [ˈspuːfɪŋ]英 [ˈspuːfɪŋ]
  • 网络欺骗;ARP欺骗;伪装;假冒;网络欺骗
spoofingspoofing
  1. Based on the prediction analysis , the existing IP spoofing could be detected .

    通过预测分析,及时检测出已经存在的IP欺骗攻击;

  2. A new method to actively detect the switch network ARP spoofing

    交换网络ARP欺骗的主动检测机制

  3. Someone has been spoofing my address .

    有人一直在冒用我的电邮地址发送电邮。

  4. IP Source Address Spoofing Filtering Based on Scale Free Property of Internet

    基于Internet无尺度特性的IP源地址假冒过滤

  5. IP Spoofing Attack : Principles , Methods , Tools and Countermeasures

    IP欺骗攻击技术原理、方法、工具及对策

  6. Prevention and Detection of ARP Spoofing in Campus Network Analysis

    校园网ARP欺骗分析与防范检测技术

  7. Congestion Control and Protocol Spoofing Based on TCP / IP over Satellite

    卫星TCP/IP的拥塞控制与协议欺骗

  8. IP spoofing is a common but complex attacking method .

    IP欺骗是常用的一种攻击手段。

  9. The Research of Network Attack Based on ARP Spoofing

    基于ARP欺骗的网络攻击研究

  10. New Method of ARP Spoofing Detection in Switched Environment

    交换机环境下ARP欺骗检测的新方法

  11. A system architecture against ARP spoofing based on packet filtering

    一种基于报文过滤防御ARP欺骗的系统架构

  12. Approach to countermeasures of IP spoofing attack based on UNIX

    基于UNIX的IP欺骗式攻击对策研究

  13. Research on ARP Spoofing and Implementation of Security Solution for ARP

    ARP欺骗攻击研究及ARP安全防护的实现

  14. The Analysis of the Principle of IP Spoofing

    IP欺骗原理分析

  15. This paper analyzes the abstraction of IP Spoofing attack .

    分析了IP欺骗式攻击的攻击原理。

  16. We solve the address spoofing and flood attacking problems by virtual circuit .

    引如虚电路机制可以解决在原层次网络体系结构中所存在的地址欺骗问题以及洪水攻击问题等。

  17. Technical Analysis and Defence Policy of IP Spoofing

    IP欺骗的技术分析及防御措施

  18. IP source address spoofing filtering based on Bloom filter

    基于Bloom滤波器的IP源地址假冒过滤

  19. In general , you can help prevent spoofing by using stringent authentication .

    一般来说,您可以通过使用严格的身份验证防止电子欺骗。

  20. Analyze and Guard the Damage of ARP Spoofing to Campus Network

    浅析ARP欺骗对校园网的危害及防范

  21. Managing access includes risk mitigation of identity theft or spoofing .

    管理访问可以降低身份盗窃或假冒所带来的风险。

  22. Analysis of the state under IP spoofing

    基于IP欺骗攻击的状态分析法研究

  23. System of Preventing IP Address Embezzlement Based on ARP Spoofing

    基于ARP伪装技术的IP地址防盗用系统

  24. Research of ARP Spoofing Attack Protocol Based on Cache Overtime

    基于缓存超时的ARP欺骗攻击协议的研究

  25. Address Space Spoofing Using Address Resolution Protocol

    利用地址解析协议的地址空间欺骗技术

  26. Host spoofing is just the tool we need .

    主机欺骗刚好是我们需要的工具。

  27. Network Security Management Using ARP Spoofing

    运用ARP欺骗进行网络安全管理

  28. This article based on a local network security event mainly analyses the Trojan using ARP spoofing .

    论文以笔者亲历的局域网安全事件为背景,解析了一种近期比较典型的实施ARP欺骗攻击的木马。

  29. Principle of ARP Spoofing Based Attacks and Defense Instrument

    ARP协议攻击原理及其防范措施

  30. Analysis and Solutions of ARP Spoofing Attacks in Library LAN

    图书馆局域网ARP欺骗攻击分析与解决方案研究