期刊文献+

电子政务系统中IP欺骗攻击与防范措施的研究

The Research of the IP Deceit Attacks and Guards Against the Measure in the E-government System
下载PDF
导出
摘要 主要论述攻击者如何利用TCP/IP协议的缺陷来攻击电子政务网络的IP欺骗技术和原理,并简要介绍了在电子政务网络中IP欺骗防范措施。 The article mainl7y elaborates how the aggressor use TCP/IP agreement's flaw to attack the E-government network with the IP deceit technology and the principle, and briefly introduced the IP deceit guard measure in the E-government network.
作者 陈彦铃
出处 《河池学院学报》 2006年第2期45-47,共3页 Journal of Hechi University
关键词 IP欺骗 信任 序列号 IP deceit trust sequence number
  • 相关文献

参考文献3

二级参考文献15

  • 1DEREK ATKINS 严伟(译).Internet网络安全专业参考手册[M].北京:机械工业出版社,1998..
  • 2W.Richard.Steven.TCP/IP详解卷1:协议[M].机械工业出版社,2001-08..
  • 3[1]Morris R T. A Weakness in the 4.2BSD UNIX TCP/IP Software. AT&T Bell Laboratories, Murray Hill, NJ: 1985
  • 4[2]CERT Advisory CA-1995-01. IP Spoofing Attacks and Hijacked Terminal Connections. http:∥www.cert.org/advisories/CA-1995-01. html
  • 5[3]CERT Advisory CA-1996-21. TCP SYN Flooding and IP Spoofing Attacks. http:∥www.cert.org/advisories/CA-1996-21. html
  • 6[4]Laurent J. Simple Active Attack Against TCP. http:∥www.insecure.org/stf/iphijack.txt. 2001
  • 7[5]Marina del Rey. Transmission Control Protocol DARPA Internet Program Protocol Specification. RFC793, 1981
  • 8[6]Sharma K. IP Spoofing. Issue 63 of Linux Gazette, 2001, (Extra)
  • 9[7]Kohl J, Neuman C. The Kerberos Network Authentication Service(V5). RFC1510, 1993
  • 10[8]Kent S, Atkinson R. Security Architecture for the Internet Protocol. RFC1825, 1998

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部