SYN

[计] 同步字符

  • Tcp_input () executes at the s / w interrupt and picks up the SYN packet from ipintrq processes it and places the partially completed socket connection in an incomplete socket queue .

    tcpinput()在s/w中断时执行,并从ipintrq拾取 SYN包,对其进行处理,并将部分完成的套接字连接放入完成的套接字队列。

  • The function tcp_output is called which outputs the SYN packet onto the network .

    调用函数tcpoutput,将 SYN包输出到网络。

  • The outbound SYN packet from each host creates the necessary NAT state for its own NATs .

    从各自的主机外出的 SYN包,为他们自己的NAT产生可能的NAT状态。

  • The socket state on the client side now is SYN_SENT .

    客户端上的套接字状态现在是 SYN SENT

  • A SYN Flood Variation Attack Detection Model in Botnet

    僵尸网络中的变种 SYN Flood攻击检测模型

  • When a new TCP connection comes in from a client by means of a packet with the SYN bit set the server creates an entry for the half-open connection and responds with a SYN-ACK packet .

    当从客户机发来新的TCP连接时,数据包设置了 SYN位,服务器就为这个半开的连接创建一个条目,并用一个SYN-ACK数据包进行响应。

  • Enough SYN requests to the system and an attacker can use all the connections on a system so that nothing else can get through .

    只要针对系统的 SYN请求足够多,攻击者就能够使用系统上的所有连接,从而阻止任何东西通过。

  • The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address then floods a server with TCP SYN packets .

    当恶意客户机使用虚假的源地址来伪造一个IP报文时,TCP就会出现问题了,这会大量TCP SYN报文 攻击服务器。

  • The interface on the destination ( the server ) receives the incoming SYN packet places it on the ipintrq queue and raises a software interrupt .

    目的地(服务器)上的接口接收传入 SYN包,将其放在ipintrq队列中,并引发软件中断。

  • When the client issues connect the tcp_output () function is called at the protocol layer which outputs the SYN packet onto the interface .

    当客户端发布connect时,在协议层调用tcpoutput()函数,将 SYN包输出到接口。

  • A Brief Analysis of SYN FLOOD Attack Principle and Defensive Measures

    浅析 SYN Flood攻击原理及其防御

  • If the state is SYN_RCVD then a RST segment is sent by setting the state to CLOSED and calling tcp_output () .

    如果状态是 SYN RCVD,则通过将状态设置为CLOSED并调用tcpoutput()发送RST段。

  • Together our data suggest an early role for SYN and inflammation in PD pathogenesis .

    总之,我们的数据提示: SYN和炎症在PD病理发生早期起作用。

  • Tcp_usrreq () now calls soisconnecting () which sets the state of the socket on the client host as SYN_SENT .

    tcpusrreq()现在调用soisconnecting(),它可以将客户端主机上的套接字的状态设置为 SYN SENT

  • The O-dpaH in which the amide hydrogen atoms were transferred or eliminated and the molecular framework was changed between syn and anti form shows coordinated diversity on the different conditions .

    在不同配位条件下,二吡啶胺单氧化物显示了配位多样性,配体酰胺上的氢原子发生转移或者消除,分子骨架在 式和反式之间变换。

  • For example the initial SYN request can be a gold mine ( as can the reply to it ) . RST packets also have some interesting features that can be used for identification .

    例如,初始化的 SYN请求是一个金矿( 以为这个 SYN请求是要回复的),RST信息包也具有一些比较有趣的特征用来鉴别系统)。

  • The address and port to which these original SYNs are sent is determined through port prediction .

    地址和端口指向那些最初的 SYN 的通过端口预指定的 地方

  • A preventing method of DDoS Based on SYN Loophole

    一种基于 SYN漏洞的DDoS防御方法

  • Research on Defensive Methods of SYN Flood Attack Based on Statistical Characteristic

    基于统计特性的 SYN Flood攻击防御方法研究

  • You can specify which incoming TCP packets to scan and discard those that don 't match the flags ACK FIN PSH RST SYN or URG .

    可以指定应该扫描哪些到达的TCP数据包,丢弃不与ACK、FIN、PSH、RST、 SYN或URG标志匹配的数据包。

  • The Principle and Defensive Measures of SYN Flooding Attack

    SYNFlooding攻击原理与防御措施

  • This paper analyzes the principle of SYN attacks on the basis of the proposed methods have been inadequate defense which gives a solution SYN attacks .

    在分析 SYN攻击原理的基础上,提出了已有防御方法的不足,据此给出了一种解决SYN攻击的方法。

  • Furthermore we provide evidence that the CD36 scavenger receptor and downstream kinases are involved in SYN-mediated microglial activation .

    此外,CD36受体和下游的激酶参与 SYN 神经胶质的活化。

  • The first setting enables TCP SYN cookies .

    第一个设置启用TCP SYNcookie。

  • Coexistence of 5-HT with NSE or SYN in corpus iuteum cells of bovine during estrous cycle

    5-HT与NSE和 SYN在牛周期黄体细胞中的共存