期刊文献+

在以太网中实现安全的地址映射

Implement secure address resolution over Ethernet
下载PDF
导出
摘要 随着以太网规模的不断扩大,来自网络内部的安全威胁越来越突出.本文分析了地址映射协议(ARP)的安全隐患及其在以太网中可能面对的安全威胁,提出了地址映射协议SARP.SARP通过使用专门的映射服务器可实现IP地址到硬件地址的安全映射,可以有效地避免非法用户对地址信息的纂改、重播以及实施ARP伪装攻击. With the enlargement of the Ethemet scale, the threats from inner network have become more and more outstanding. In this paper, both the potential safety hazards of the address resolution protocol(ARP) and its would-be threats when used in Ethemet have been markedly analyzed, and also address resolution protoeol(SARP) has been introduced here. SARP can realize the safety resolution from IP address to hardware address, thus address information can effectively avoid being distorted and replayed by the illegal usem who will never carry out disguised ARP attacks.
出处 《重庆交通学院学报》 2006年第4期151-153,共3页 Journal of Chongqing Jiaotong University
关键词 以太网 安全 网络协议 重放攻击 完整性检查 Ethemet security network protocol replay attack integrity check
  • 相关文献

参考文献5

  • 1Ronald Rivest. The MD5 Message Digest Algorithm [ EB/OL]. http://www.faqs. org/rfcs/rfc1321.html,April 1992.
  • 2NIST. FIPS 180 - 2: Secure Hash Standard [EB/OL].http://csrc.nist. gov/publications/fips/fips180 - 2/fips180-2withchangenotice. pdf,August 2002.
  • 3William Stallings.网络安全基础教程应用与标准(第2版)[M].北京:清华大学出版社,2004.
  • 4周悦芝,张尧学,王勇.一种用于网络计算的可定制启动协议[J].软件学报,2003,14(3):538-546. 被引量:12
  • 5[美]史蒂文斯,范建华.TCP/IP详解卷1:协议[M].北京:机械工业出版社,2000.

二级参考文献15

  • 1[1]Noguchi S. Network computing technology and information society toward 21st century. In: Makoto T, ed. Proceedings of the 7th International Conference on Parallel and Distributed Systems. Los Alamitos, CA: Institute of Electrical and Electronic Engineers, Inc., 2000. 3~9.
  • 2[2]Revett M, Boyd I, Stephens C. Network computing: a tutorial review. IEE Electronics & Communication Engineering Journal, 2001, 13(1):5~15.
  • 3[3]Redford J, Taunton M. Acorn's technology for network computing. In: Bob W, ed. Proceedings of the IEEE COMPCON'97. Los Alamitos, CA: IEEE Computer Society Press, 1997. 124~129.
  • 4[4]Richardson T, Stafford-Fraser Q, Wood KR, Hopper A. Virtual network computing. IEEE Internet Computing, 1998,2(1):33~38.
  • 5[5]Hasedawa A, Nakajima T. A user interface system for home appliance with virtual network computing. In: Makoto T, ed. Proceedings of the 21st International Conference on Distributed Computing Systems Workshop. Los Alamitos, CA: Institute of Electrical and Electronic Engineers, Inc., 2001. 229~234.
  • 6[6]Home Wireless Networks, Inc. Home networking. http://www.iec.org/online/tutorials/.
  • 7[7]Sollins K. The TFTP protocol (Revision 2). RFC 1350, 1992.
  • 8[8]Compaq Computer Corporation, Phoenix Technologies Ltd., Intel Corporation. BIOS boot specification. Version 1.01, 1996. http://www.phoenix.com/techs/specs.html.
  • 9[9]Compaq Computer Corporation, Phoenix Technologies Ltd., Intel Corporation. Plug and play BIOS specification. Version 1.0A, 1994. http://www.phoenix.com/techs/specs.html.
  • 10[10]Droms R. Dynamic host configuration protocol. RFC 2131, 1997.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部