期刊文献+

基于NDIS的网络诱骗技术的原理及实现 被引量:1

The principle and realization of network trap technology based on NDIS
下载PDF
导出
摘要 网络诱骗技术是对传统网络防御手段的有效补充,通过将网络攻击者引向伪造的、虚假的信息资源,达到保护网络中真正有价值信息资源的目的.本文介绍了网络诱骗技术的原理,并利用NDIS底层驱动来实现网络数据包的截获,防范外部对本地主机的入侵,为发现攻击和阻断攻击也提供了相应的工具和技术. Network trap, which protects the valuable resource of information by guiding the attacker to imitative and illusive information, is an available makeup of traditional network defense. The article introduces the principle of network trap, and keeps away the inbreak from host computer by realizing the intercept and capture using the bottom drive of NDIS, at the same time, provides according tool and technology to find attack and interdiction.
出处 《河南科学》 2005年第2期267-270,共4页 Henan Science
基金 河南省自然科学基金资助项目(0411014800)
关键词 NDIS 网络诱骗 地址扫描 NDIS network trap address scan
  • 相关文献

参考文献8

二级参考文献12

  • 1周武.软件脆弱性检测、分类与建库:硕士学位论文[M].北京:中科院软件研究所,1999..
  • 2StevensW.RichardTCP/IP详解卷1:协议(影印版)[M].北京:机械工业出版社,2002..
  • 3.RFC792.Internet控制信息协议(ICMP)[S].,..
  • 4[1]Windows 2000 DDK.Microsoft,1999
  • 5[2]Kent S,Atkinson R.RFC2401:Security Architecture for the Internet Protocol.1998
  • 6[3]McDonald D,Metz D B,Phan B.RFC2367:PF_KEY Key Management API,Version 2.1998
  • 7[4]Stallings W.Network Security Essentials:Applications and Standards.2000
  • 8[1]Cohen F. A Note on the Role of Deception in Information Protection[J]. Computers and Security,1998,17(6):483-506.
  • 9[2]Lee W, Stolfo S. Data Mining Approaches for Intrusion Detection [A]. 7th USENIX Security Symposium[C]. San Antonio, TX, 1998.
  • 10[3]Vigna G, Kemmrer RA. NetSTAT:A network-based intrusion detection system [J]. Journal of Computer Security, 1999,7(1):37-71.

共引文献22

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部