期刊文献+

信息收集型网络攻击及其预防 被引量:1

Network Attack and Prevention of Information Collecting
下载PDF
导出
摘要 信息收集型网络攻击是一类常见的网络攻击。该文对此类攻击的常见方法和典型攻击工具进行了介绍,并针对攻击原理提出了一些有效的预防措施。 Information collecting attack is a kind of common network attack. The paper introduces some usual methods and typical tools about the attack. A lot of working preventive measures is also provided aimed at attacking principle.
作者 顾翔 李伟 GU Xiang,LI Wei (School of Computer Science and Technology, Nantong University, Nantong 226019, China)
出处 《电脑知识与技术》 2008年第11期875-876,878,共3页 Computer Knowledge and Technology
基金 江苏省高校“青蓝工程”资助
关键词 网络攻击 信息收集型网络攻击 攻击预防 network attack information collecting attack attack prevention
  • 相关文献

参考文献3

二级参考文献59

  • 1[1]Morris R T. A Weakness in the 4.2BSD UNIX TCP/IP Software. AT&T Bell Laboratories, Murray Hill, NJ: 1985
  • 2[2]CERT Advisory CA-1995-01. IP Spoofing Attacks and Hijacked Terminal Connections. http:∥www.cert.org/advisories/CA-1995-01. html
  • 3[3]CERT Advisory CA-1996-21. TCP SYN Flooding and IP Spoofing Attacks. http:∥www.cert.org/advisories/CA-1996-21. html
  • 4[4]Laurent J. Simple Active Attack Against TCP. http:∥www.insecure.org/stf/iphijack.txt. 2001
  • 5[5]Marina del Rey. Transmission Control Protocol DARPA Internet Program Protocol Specification. RFC793, 1981
  • 6[6]Sharma K. IP Spoofing. Issue 63 of Linux Gazette, 2001, (Extra)
  • 7[7]Kohl J, Neuman C. The Kerberos Network Authentication Service(V5). RFC1510, 1993
  • 8[8]Kent S, Atkinson R. Security Architecture for the Internet Protocol. RFC1825, 1998
  • 9[1]Dethy. Examining Port Scan Methods-Analysing Audible Techniques Wh itepaper.http://www.syn nergy.net/downloads/papers/portscan. txt,200 1
  • 10[2]Fyodor. The Art of Port Scanning. http://www.phrack.com/phrack/51/P51-11,1997

共引文献268

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部