SYN

网络  半连接; 连接请求; 同步序列号; 同步字符; 同义词

计算机



双语例句

  1. The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.
    当恶意客户机使用虚假的源地址来伪造一个IP报文时,TCP就会出现问题了,这会大量TCPSYN报文攻击服务器。
  2. When the client issues connect, the tcp_output() function is called at the protocol layer, which outputs the SYN packet onto the interface.
    当客户端发布connect时,在协议层调用tcpoutput()函数,将SYN包输出到接口。
  3. When a new TCP connection comes in from a client by means of a packet with the SYN bit set, the server creates an entry for the half-open connection and responds with a SYN-ACK packet.
    当从客户机发来新的TCP连接时,数据包设置了SYN位,服务器就为这个半开的连接创建一个条目,并用一个SYN-ACK数据包进行响应。
  4. Enough SYN requests to the system, and an attacker can use all the connections on a system so that nothing else can get through.
    只要针对系统的SYN请求足够多,攻击者就能够使用系统上的所有连接,从而阻止任何东西通过。
  5. The function tcp_output is called, which outputs the SYN packet onto the network.
    调用函数tcpoutput,将SYN包输出到网络。
  6. The tcp_input() routine on the client side processes the SYN ACK packet, and calls tcp_output() to send an ACK packet back to the server.
    客户端上的tcpinput()例程处理SYNACK包,并调用tcpoutput()将ACK包发回到服务器。
  7. Tcp_usrreq() now calls soisconnecting(), which sets the state of the socket on the client host as SYN_SENT.
    tcpusrreq()现在调用soisconnecting(),它可以将客户端主机上的套接字的状态设置为SYNSENT。
  8. Tcp_input() executes at the s/ w interrupt, and picks up the SYN packet from ipintrq, processes it, and places the partially completed socket connection in an incomplete socket queue.
    tcpinput()在s/w中断时执行,并从ipintrq拾取SYN包,对其进行处理,并将部分完成的套接字连接放入完成的套接字队列。
  9. The first setting enables TCP SYN cookies.
    第一个设置启用TCPSYNcookie。
  10. A client initiates a connection to a host ( and a specific port) by sending a SYN synchronize packet.
    客户机通过发送SYN同步数据包发起到一个主机(和特定端口)的连接。
  11. If the state is SYN_RCVD, then a RST segment is sent by setting the state to CLOSED and calling tcp_output().
    如果状态是SYNRCVD,则通过将状态设置为CLOSED并调用tcpoutput()发送RST段。
  12. The socket state on the client side now is SYN_SENT.
    客户端上的套接字状态现在是SYNSENT。
  13. You can specify which incoming TCP packets to scan and discard those that don't match the flags ACK, FIN, PSH, RST, SYN, or URG.
    可以指定应该扫描哪些到达的TCP数据包,丢弃不与ACK、FIN、PSH、RST、SYN或URG标志匹配的数据包。
  14. The interface on the destination ( the server) receives the incoming SYN packet, places it on the ipintrq queue, and raises a software interrupt.
    目的地(服务器)上的接口接收传入SYN包,将其放在ipintrq队列中,并引发软件中断。
  15. The Principle and Defensive Measures of SYN Flooding Attack
    SYNFlooding攻击原理与防御措施
  16. A SYN Flood Variation Attack Detection Model in Botnet
    僵尸网络中的变种SYNFlood攻击检测模型
  17. For example, the initial SYN request can be a gold mine ( as can the reply to it). RST packets also have some interesting features that can be used for identification.
    例如,初始化的SYN请求是一个金矿(以为这个SYN请求是要回复的),RST信息包也具有一些比较有趣的特征用来鉴别系统)。
  18. Most TCP sessions start with one endpoint sending a SYN packet, to which the other party responds with a SYN-ACK packet.
    我们知道,绝大多数的TCP会话的建立,都是通过一端先发送一个SYN包开始,另一方则回发一个SYN-ACK包的过程。
  19. A denial of service attack results if an attacker repeatedly sends packets with the syn bit turned on toward a victim.
    如果攻击者使用打开的syn位向受害者重复发送信息包,则会产生拒绝服务攻击。
  20. A preventing method of DDoS Based on SYN Loophole
    一种基于SYN漏洞的DDoS防御方法
  21. The address and port to which these original SYNs are sent is determined through port prediction.
    地址和端口指向那些最初的SYN包发向的通过端口预指定的地方。
  22. The O-dpaH, in which the amide hydrogen atoms were transferred or eliminated and the molecular framework was changed between syn and anti form, shows coordinated diversity on the different conditions.
    在不同配位条件下,二吡啶胺单氧化物显示了配位多样性,配体酰胺上的氢原子发生转移或者消除,分子骨架在顺式和反式之间变换。
  23. A Brief Analysis of SYN FLOOD Attack Principle and Defensive Measures
    浅析SYNFlood攻击原理及其防御
  24. Attacker sends a TCP SYN packet to the target port from his own IP address ( or one he controls) to request a connection.
    攻击者从自己的的IP地址(或者他控制的)发送一个TCPSYN攻击或者自己包到目标端口请求连接。
  25. The outbound SYN packet from each host creates the necessary NAT state for its own NATs.
    从各自的主机外出的SYN包,为他们自己的NAT产生可能的NAT状态。
  26. This paper analyzes the principle of SYN attacks on the basis of the proposed methods have been inadequate defense, which gives a solution SYN attacks.
    在分析SYN攻击原理的基础上,提出了已有防御方法的不足,据此给出了一种解决SYN攻击的方法。
  27. Research on Defensive Methods of SYN Flood Attack Based on Statistical Characteristic
    基于统计特性的SYNFlood攻击防御方法研究
  28. Furthermore, we provide evidence that the CD36 scavenger receptor and downstream kinases are involved in SYN-mediated microglial activation.
    此外,CD36受体和下游的激酶参与SYN介导的小神经胶质的活化。
  29. Together, our data suggest an early role for SYN and inflammation in PD pathogenesis.
    总之,我们的数据提示:SYN和炎症在PD病理发生早期起作用。