首页
登录
从业资格
There are different ways to perform IP b
There are different ways to perform IP b
考试题库
2022-08-02
28
问题
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment?(请作答此空)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other?( ), the attacker inserts a large amount of?( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an?( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device( )the network.A .messageB. informationC. requestD. date
选项
A .message
B. information
C. request
D. date
答案
C
解析
执行基于IP的DoS攻击,有不同的方法。最常见的基于IP的DoS攻击是攻击者发送大量连接建立请求(例如,TCP SYN请求)以建立与控制器或DPS的挂起连接。这样,攻击者就可以消耗合法用户所需的网络资源。在其他情况下,攻击者通过用随机值欺骗全部或部分头字段,向数据域中插入大量假数据包。这些传入的数据包将触发表丢失,并在流请求消息中发送大量到网络控制器造成控制器资源饱和。在某些情况下,获得DPS访问权的攻击者可以在流请求消息中人为地生成大量随机包,以使控制通道和控制器资源饱和。此外,DPS间的多样性不足也助长了此类攻击的快速传播。传统的移动回程设备由于其复杂性以及是供应商专属设备,天然是防止攻击传播的。此外,传统的移动回程设备不需要与核心控制器频繁通信,而DPS与中央控制器的通信则需要频繁通信。这些特性降低了DoS攻击的影响和传播。此外,传统的回程设备是由多个网络元素共同控制的。例如,单一的长期演化(LTE)基站连接多达32个MME(负责信令处理的关键节点)。因此,对单个核心元素的DoS/DDOS攻击不会终止回程设备或网络的整个操作。
转载请注明原文地址:https://tihaiku.com/congyezige/2398719.html
本试题收录于:
高级网络规划设计师题库软件水平考试初中高级分类
高级网络规划设计师
软件水平考试初中高级
相关试题推荐
Routingprotocolsusedifferenttechniqu
横线处应选择() A.same B.different C.sin
A.same B.different C.single D.mult
横线处应选择() A.same B.different C.single
某服务器软件系统对可用性(Availability)和性能(Performanc
Manyoftheactivitiesperformedduring
Manyoftheactivitiesperformedduring
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
TherearedifferentwaystoperformIPb
随机试题
Thetrafficpolicecame______theaccidentoccurred.A、immediatelyB、immediately
Atatimewhentheworldisshortofcausesforcelebration,hereisacandi
(l)Debatesamongcandidatesarerareinmostcountries.Buttheyhavebecome
为保证防火卷帘、防火门、防火窗工程的施工质量和使用功能,减少火灾危害,保护人身和
注册会计师在对期末存货进行截止测试时,下列应当关注的内容正确的有( )。A、所有
治疗痛经湿热下注证,应首选( )。A.清热调血汤 B.龙胆泻肝汤 C.知柏
β-内酰胺抗生素类药物分子结构中最不稳定的部分是A.噻嗪环 B.低价态(二价)
如果不顾学生的年龄特征和接受能力,在教育工作中搞“一刀切”“一锅煮”,让孩子同成
商品房销售,()应按购房款2%~3%的比例向售房单位缴交专项维修资金。A:建设
常用水泥中,耐侵蚀性最差的水泥是()。A.硅酸盐水泥 B.矿渣水泥 C.火
最新回复
(
0
)