当前位置:首页 > (高级)网络规划设计师 > 正文内容

TherearedifferentwaystoperformIPbasedDoSAttacks.ThemostcommonIPb

TherearedifferentwaystoperformIPbasedDoSAttacks.ThemostcommonIPbasedDoSattackisthatanattackersendsanextensiveamountofconnectionestablishment()(e.g.TCPSYNrequests)toestablishhangingconnectionswiththecontrolleroraDPS.Suchaway,theattackercanconsumethenetworkresourceswhichshouldbeavailableforlegitimateusers.Inother(),theattackerinsertsalargeamountof()packetstothedataplanebyspoofingallorpartoftheheaderfieldswithrandomvalues.Theseincomingpacketswilltriggertable-missesandsendlotsofpacket-inflowrequestmessagestothenetworkcontrollertosaturatethecontrollerresources.Insomecases,an()whogainsaccesstoDPScanartificiallygeneratelotsofrandompacket-inflowrequestmessagestosaturatethecontrolchannelandthecontrollerresources.Moreover,thelackofdiversityamongDPSsfuelsfuelsthefastpropagationofsuchattacks.Legacy?mobilebackhauldevicesareinherentlyprotectedagainstthepropagationofattacksduetocomplexandvendorspecificequipment.Moreover,legacybackhauldevicesdonotrequirefrequentcommunicationwithcorecontroldevicesinamannersimilartoDPSscommunicatingwiththecentralizedcontroller.ThesefeaturesminimizeboththeimpactandpropagationofDoSattacks.Moreover,thelegacybackhauldevicesarecontrolledasajointeffortofmultiplenetworkelement.Forinstance,asingleLongTermEvilution(LT E)eNodeB?isconnectedupto32MMEs.Therefore,DoS/DDoSattackonasinglecoreelementwillnotterminatetheentireoperationofabackhauldevice(请作答此空)thenetwork.

A.or

B.of

C.in

D.to

正确答案是A

扫描二维码免费使用微信小程序搜题/刷题/查看解析。

版权声明:本文由翰林刷题小程序授权发布,如需转载请注明出处。

本文链接:https://20230611.cn/post/2414061.html