期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks 被引量:2
1
作者 Rodolfo Baez Junior Sanjeev Kumar 《Journal of Information Security》 2014年第3期123-135,共13页
With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or ... With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems. 展开更多
关键词 DENIAL of Service (DOS) attack ECHO Request ECHO REPLY Internet Control Message Protocol (ICMP) Land attack Operating System (OS) ping attack
下载PDF
信息安全中黑客常用网络命令Ping解析 被引量:2
2
作者 刘百平 《无线互联科技》 2016年第12期65-67,共3页
文章列举了黑客攻击流程和攻击方式,介绍了常用网络命令,描述了Ping命令的语法格式,详细地说明了各个参数的作用。通过实际应用验证了Ping命令的功能,测试网卡和网络协议工作是否正常,测试网络连接是否正常,Ping命令是如何攻击网络的。... 文章列举了黑客攻击流程和攻击方式,介绍了常用网络命令,描述了Ping命令的语法格式,详细地说明了各个参数的作用。通过实际应用验证了Ping命令的功能,测试网卡和网络协议工作是否正常,测试网络连接是否正常,Ping命令是如何攻击网络的。通过各类返回信息分析网络连通及配置情况。 展开更多
关键词 黑客 攻击流程 攻击方式 网络命令 ping命令 网络测试
下载PDF
基于路由器的防火墙设计 被引量:1
3
作者 张保通 《华北航天工业学院学报》 2002年第2期16-19,共4页
本文阐述了基于路由器的防火墙设计方法 。
关键词 访问控制列表 ping湮没 DOS攻击 IP欺骗
下载PDF
2016年砂板乒乓球苏州站梁红安决赛阶段技术分析 被引量:1
4
作者 曹爱斌 《韶关学院学报》 2016年第12期47-50,共4页
分析2016年砂板乒乓球苏州站运动员梁红安在决赛阶段的比赛视频,借鉴乒乓球三段指标评估法,对梁红安在本站比赛的决赛阶段技术发挥情况进行诊断,通过对其发抢段、接抢段和相持段的技术与战术的统计,发现比赛当中梁红安战术运用得当、充... 分析2016年砂板乒乓球苏州站运动员梁红安在决赛阶段的比赛视频,借鉴乒乓球三段指标评估法,对梁红安在本站比赛的决赛阶段技术发挥情况进行诊断,通过对其发抢段、接抢段和相持段的技术与战术的统计,发现比赛当中梁红安战术运用得当、充分抓住砂板击球旋转弱的特点、发挥前三板特别是接发球的优势、并有效回避了相持段的不足,最终赢得了比赛的胜利. 展开更多
关键词 砂板乒乓球 梁红安 技术分析 进攻模式
下载PDF
Controlled Bidirectional Quantum Direct Communication by Using a GHZ State 被引量:20
5
作者 满忠晓 夏云杰 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第7期1680-1682,共3页
A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ... A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed. 展开更多
关键词 SECURE DIRECT COMMUNICATION WOJCIKS EAVESDROPping attack ping-PONGPROTOCOL ENTANGLEMENT CRYPTOGRAPHY SCHEME
下载PDF
平喘方加味治疗小儿哮喘发作期临床疗效观察 被引量:12
6
作者 吴杰 虞坚尔 薛征 《中华中医药杂志》 CAS CSCD 北大核心 2013年第10期3012-3014,共3页
目的:观察平喘方加味治疗小儿哮喘发作期的临床疗效。方法:将120例哮喘发作期患儿随机分为对照组和试验组,每组60例。对照组用硫酸沙丁胺醇气雾剂治疗,试验组在硫酸沙丁胺醇气雾剂治疗基础上,用平喘方加味治疗,疗程均为3d。结果:试验组... 目的:观察平喘方加味治疗小儿哮喘发作期的临床疗效。方法:将120例哮喘发作期患儿随机分为对照组和试验组,每组60例。对照组用硫酸沙丁胺醇气雾剂治疗,试验组在硫酸沙丁胺醇气雾剂治疗基础上,用平喘方加味治疗,疗程均为3d。结果:试验组临床痊愈率为53.33%,对照组为35.00%,两组临床痊愈率差异有统计学意义(P<0.05);试验组治疗后症状体征积分明显少于对照组(P<0.05)。结论:平喘方能较好改善哮喘发作期患儿的症状和体征,提高临床疗效。 展开更多
关键词 平喘方 哮喘 发作期 疗效
原文传递
平喘咳外敷散内外合治小儿哮喘发作期咳喘证的疗效研究 被引量:6
7
作者 黄美芬 王力宁 +1 位作者 邓玉芝 陈光 《中国中西医结合儿科学》 2016年第6期564-566,共3页
目的验证平喘咳外敷散内外合治在小儿哮喘发作期咳喘证治疗中止咳平喘的有效性。方法收集符合哮喘发作期诊断并有咳喘证候的病例进行数据采集整理。记录治疗前与治疗后主要证候的积分。结果治疗总有效率为100%。治疗后咳嗽、气喘、痰鸣... 目的验证平喘咳外敷散内外合治在小儿哮喘发作期咳喘证治疗中止咳平喘的有效性。方法收集符合哮喘发作期诊断并有咳喘证候的病例进行数据采集整理。记录治疗前与治疗后主要证候的积分。结果治疗总有效率为100%。治疗后咳嗽、气喘、痰鸣、哮鸣音证候积分及总积分均明显改善,与治疗前比较差异有统计学意义(P<0.05)。结论平喘咳外敷散内外合治止咳平喘的疗效显著,且平喘作用起效较快。 展开更多
关键词 哮喘发作期咳喘证 平喘咳外敷散 中医药 止咳平喘 疗效 儿童
下载PDF
Revisiting Quantum Secure Direct Communication with W State 被引量:5
8
作者 刘俊 刘益民 +2 位作者 曹海静 史守华 张战军 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第10期2652-2655,共4页
The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of t... The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of this leak, an eavesdropper may adopt the intercept-measure-resend strategy to attack the quantum channel such that in the C-S QSDC protocol the secret message can be completely eavesdropped. To fix the leak, the original version of the C-S QSDC protocol is revised. As a consequence, the security is improved and assured at least in the case of an ideal quantum channel. 展开更多
关键词 WOJCIKS EAVESDROPping attack ping-PONG PROTOCOL ENTANGLEMENT
下载PDF
表象训练在乒乓球正手攻球教学中的应用研究 被引量:5
9
作者 刘玲 王凯 《遵义师范学院学报》 2009年第5期124-126,共3页
改革教学方法是当前教育改革提出的一项重要任务,将表象训练运用于乒乓球的教学中,探索出一种将传统教学手段与现代心理训练相结合的教学方法不失为一种尝试。通过实验组与对照组的数据对比发现:实验组与对照组成绩有显著性差异,实验结... 改革教学方法是当前教育改革提出的一项重要任务,将表象训练运用于乒乓球的教学中,探索出一种将传统教学手段与现代心理训练相结合的教学方法不失为一种尝试。通过实验组与对照组的数据对比发现:实验组与对照组成绩有显著性差异,实验结果表明:在乒乓球普修课正手攻球教学中引入表象训练法的教学效果优于传统的教学方法。 展开更多
关键词 表象训练 乒乓球 普修课 正手攻球
下载PDF
McAfee SecurityCenter Evaluation under DDoS Attack Traffic
10
作者 Sirisha Surisetty Student Member Sanjeev Kumar 《Journal of Information Security》 2011年第3期113-121,共9页
During the Distributed Denial of Service (DDoS) attacks, computers are made to attack other computers. Newer Firewalls now days are providing prevention against such attack traffics. McAfee SecurityCenter Firewall is ... During the Distributed Denial of Service (DDoS) attacks, computers are made to attack other computers. Newer Firewalls now days are providing prevention against such attack traffics. McAfee SecurityCenter Firewall is one of the most popular security software installed on millions of Internet connected computers worldwide. “McAfee claims that if you have installed McAfee SecurityCentre with anti-virus and antispyware and Firewall then you always have the most current security to combat the ever-evolving threats on the Internet for the duration of the subscription”. In this paper, we present our findings regarding the effectiveness of McAfee SecurityCentre software against some of the popular Distributed Denial Of Service (DDoS) attacks, namely ARP Flood, Ping-flood, ICMP Land, TCP-SYN Flood and UDP Flood attacks on the computer which has McAfee SecurityCentre installed. The McAfee SecurityCentre software has an in built firewall which can be activated to control and filter the Inbound/Outbound traffic. It can also block the Ping Requests in order to stop or subside the Ping based DDoS Attacks. To test the McAfee Security Centre software, we created the corresponding attack traffic in a controlled lab environment. It was found that the McAfee Firewall software itself was incurring DoS (Denial of Service) by completely exhausting the available memory resources of the host computer during its operation to stop the external DDoS Attacks. 展开更多
关键词 Distributed DENIAL of Service (DDoS) attack MCAFEE FIREWALL NonPaged Pool Allocs ARP FLOOD ping-Flood ICMP Land TCP-SYN FLOOD UDP FLOOD attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部