An approach for resisting DoS / DDoS attacks using the trusted technology is proposed. It enhances a little bit the equipments and protocols in existing network transmission mechanism. When the attacks launching it can isolate malicious connecting requests,so that to mai...