期刊文献+

IPv6源路由机制安全性分析与攻击技术研究 被引量:2

Security Analysis and Attack Techniques of IPv6 Source Routing Mechanism
下载PDF
导出
摘要 对IPv6源路由机制进行了简单描述,在此基础上对其安全性进行了分析并给出了各种可能的攻击手段,同时对各种攻击手段进行了详细阐述,最后针对这些攻击手段提出了相应的防御措施与安全建议. On the basis of brief introduction of IPv6 source routing, its security was analyzed and then some possible attack means was proposed with detailed explanations. Finally, some defense measures were proposed in accordance with those attack means.
出处 《成都大学学报(自然科学版)》 2010年第1期60-63,共4页 Journal of Chengdu University(Natural Science Edition)
关键词 源路由 协议分析 IPV6 网络攻击 source routing protocol analysis IPv6 network attack
  • 相关文献

参考文献6

二级参考文献30

  • 1杨柳,李振宇,张大方,谢高岗.冗余最小化的IPv6拓扑发现方法[J].计算机研究与发展,2007,44(6):939-946. 被引量:13
  • 2Mei Yen,Yen Huang,Jaime Kim,Meejeong Lee,An End-to-End QoS Framework with On-Demand Bandwidth Reconfiguration,2004.NOMS2004.IEEE INFOCOM 0-7803-8356-7/04/.
  • 3Silvano Gai,Internetworking IPv6 with Cisco Routers,1999.
  • 4Sam Brown,Brian Browne,Neal Chen,Configuring IPv6 for Cisco IOS,2003.
  • 5IETF RFC 2460,Internet Protocol,Version 6 (IPv6) Specification,December 1998.
  • 6Pansiot J J, Grad D. On Routes and Multicast Trees in the Internet. ACM SIGCOMM CCR, 1998,28(1) :41-50
  • 7Cheswick B, Burch H, Branigan S. Mapping and Visualizing the InternetffProe. 2000 USENIX Annual Technical Conf. San Diego, California,June 2000; 1-12
  • 8Internet Mapping Project. Available at: URL: http://research. lumeta, com/ches/db/
  • 9Siamwalla R,Sharma R,Keshav S.Discovering Internet Topology. Technical Report fEB/OLd. CS Dept., Cornell University, July 1998. Available at:URL:http://www, cs. cornell, edu/skeshay/papers/discovery, pdf
  • 10Govindan R, Tangmunarunkit H. Heuristics for Internet Map Discovery//Proc. IEEE INFOCOM 2000. Tel-Aviv, Israel, Mar. 2000 : 1371-1380

共引文献5

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部