摘要
介绍了网络攻击所使用的手段,并对网络攻击的实施及其原理进行了分析,通过实验对扫描器、缓冲区溢出工具、木马程序及常用网络命令等进行综合应用,对所讨论的攻击手段都指出了其危害并提供了防范对策。
The article introduced network attacking uses methods, and has carried on the analysis to the implementation and the principle of network attacking, through the experiment to the scanner, the buffer overflow tool, the wooden horse procedure and the commonly used network order and so on carries on the synthesis application, to attack methods which discuss had all pointed out them harmed and has provided the guard countermeasure.
作者
梁洪波
杨振宇
LIANG Hong-bo,YANG Zhen-yu (Anhui Communications Technology Institute, Hefei 230051, China)
出处
《电脑知识与技术》
2009年第5期3407-3408,共2页
Computer Knowledge and Technology
关键词
网络攻击
网络仿真
端口扫描
入侵检测
network attacking
network simulation
intrusion detection
port scan