期刊文献+

基于ICMP协议的IP网络安全机制 被引量:4

Security Mechanism of IP Network Based on ICMP Protocol
下载PDF
导出
摘要 ICM P是IP网络中非常重要的一个报文协议,目的在于提供目标主机的反馈信息。由ICM P协议引发的一系列安全威胁乃是现今网络安全问题的一个重要组成部分。本文主要分析了几种利用ICM P数据报进行的攻击手段,深入讨论了应对ICM P攻击的网络安全机制,旨在使读者通过本文能对ICM P数据报的阻塞和边界过滤策略有一个较全面地了解。 ICMP is a significant type of protocol. This kind of message is to send the feedback of the destination in IP network to the pack's source. Types of threat caused by the vulnerabilities of this protocol are the essential component of the network security. Some kinds of attack using ICMP messages as a medium are ana- lyzed in this paper at the initiation. Then the paper thoroughly discussed the blocking and edge filtering of ICMP messages ,which are meant to deal with the ICMP attacks, It is expected to give the reader a good understanding of the network security mechanism.
作者 牛逸飞
出处 《河南科技学院学报》 2005年第4期68-71,共4页 Journal of Henan Institute of Science and Technology(Natural Science Edition)
关键词 ICMP 反馈 阻塞 边界过滤 ICMP ,feedback, blocking ,edge filtering
  • 相关文献

参考文献6

  • 1Williamstallings著,王海,张娟,蒋慧等译.数据与计算机通信(第七版)[M].北京:电子工业出版社,2004:465—467.
  • 2J. Postel. RFC 792, Internet Control Message Protocol[S]. September, 1981.
  • 3Richard A. Deal, Cisco Router Firewall Security[M]. Ciseo Press, August, 10,2004.
  • 4Saadat Malik, Network Security Principles and Practices['M_]. Cisco Press ,November, 15,2002.
  • 5Fahim Hussain YustJf Bhaiji,CCIE Security Pracrice Labs[M]. Cisco Press,February, 24,2004.
  • 6Gert De Laet,Gert Schauwers,Network Security Fundamentals[M]. Cisco Press, September, 08,2004.

同被引文献19

  • 1王志刚,王汝传,王绍棣,张登银.网络拓扑发现算法的研究[J].通信学报,2004,25(8):36-43. 被引量:35
  • 2王涛,徐健.协议分析技术在ICMP中的应用[J].重庆建筑大学学报,2005,27(1):132-135. 被引量:2
  • 3申成祎.Ping的原理及实现[J].信息技术,2005,29(6):70-71. 被引量:4
  • 4关媛,王小军,陆建德.基于SNMP的网络拓扑发现算法与实现[J].苏州大学学报(自然科学版),2006,22(1):43-48. 被引量:4
  • 5程瑞瑛.ICMP攻击模拟及安全防范措施[DB/OL].http://net-edu.ustc.edu.cn/net/img/pap/cry/cry.htm,2009.
  • 6Jiang Wei-hua,Li Wei-hua,Du Jun.The application of ICMP protocol in network scanning[C].Parallel and Distributed Computing,Applications and Technologies,2003:904-906.
  • 7Intel.Building blocks developer's manual[Z].Intel Press,2003:999-1029.
  • 8Intel Crop.lntel IXP2850 network processor,hardware reference manual[Z].2004:1-3.
  • 9Fu Yuli,Wang Xiaohong.ICMP processing module embedded in NP based firewall[C].Anti-Counterfeiting,Security and Identification,2008:310-312.
  • 10Xenofontas A. Dimtrolpoulos, Dmitri V. Krioukov, and George F, Riley. ReVisiting Intemet AS-level Topology Discovery. oai: arXiv.org:cs/0507046,2005-09-20.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部