attack signature

attack signature
сигнатура атаки
символьная строка, представляющая совокупность свойств сетевого трафика (network traffic), проявляющихся в заголовках и содержимом пакетов, в закономерностях следования групп пакетов и т. п., которые отличают атаки от обычного (легитимного) трафика

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Поможем написать реферат

Смотреть что такое "attack signature" в других словарях:

  • Signature Books — is a press specializing in subjects related to Utah, Mormonism, and Western Americana. The company was founded in 1980 by George D. Smith and Scott Kenney and is based in Salt Lake City, Utah. History In the late 1970s, Scott Kenney decided there …   Wikipedia

  • Signature move — A signature move is a move or ability that is almost analogous to the character that uses it. Usually this infers that the move was invented by the character, it cannot be used by any other character, or it is a staple of a character s range of… …   Wikipedia

  • Attack on the Sui-ho Dam — Infobox Military Conflict conflict=Attack on the Sui ho Dam partof=Korean War caption= date=June 23–June 24, 1952 place=Sui Ho (Sup ung ho), Choshin (Changjin, Fusen (Pujǒn), and Kyosen (P ungsan), North Korea result=United Nations victory… …   Wikipedia

  • Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… …   Wikipedia

  • Collision attack — In cryptography, a collision attack on a cryptographic hash tries to find two arbitrary inputs that will produce the same hash value, i.e. a hash collision. In contrast to a preimage attack, neither the hash value nor one of the inputs is… …   Wikipedia

  • Birthday attack — A birthday attack is a type of cryptographic attack, so named because it exploits the mathematics behind the birthday problem in probability theory. Given a function f , the goal of the attack is to find two inputs x 1,x 2 such that f(x 1)=f(x 2) …   Wikipedia

  • Mobile signature — A mobile signature is a digital signature generated either on a mobile phone or on a SIM card. Contents 1 Origins of the term 2 Mobile signatures today 3 Mobile Signature with On Board Key Generation …   Wikipedia

  • Digital signature forgery — In a cryptographic digital signature or MAC system, digital signature forgery is the ability to create a pair consisting of a message m and a signature (or MAC) σ that is valid for m, where m has not been signed in the past by the legitimate… …   Wikipedia

  • Blind signature — In cryptography, a blind signature, as introduced by David Chaum [David Chaum, Blind signatures for untraceable payments, Advances in Cryptology Crypto 82, Springer Verlag (1983), 199 203.] , is a form of digital signature in which the content of …   Wikipedia

  • Lamport signature — In cryptography, a Lamport signature or Lamport one time signature scheme is a method for constructing a digital signature. Lamport signatures can be built from any cryptographically secure one way function; usually a cryptographic hash function… …   Wikipedia

  • Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»