期刊文献+

RIPng路由协议安全性分析与攻击模型研究

Research on Security Analysis and Attacking Models of RIPng Routing Protocol
下载PDF
导出
摘要 对RIPng路由协议的安全性做了分析并通过实验进行验证,在此基础上提出了几种攻击模型,并对各种攻击模型的攻击方式进行了阐述,同时,针对这些攻击方式提出相应的防御措施.该研究对RIPng路由协议的具体实现和提高网络的安全性都具有一定的参考价值. The security of RIPng routing protocols was analyzed and verified after experiments.Several attacking models were proposed by means of proof-test.Different attacking methods of the models were expounded as well.At last,some solutions were given in the light of defending those attacking methods and a forecast for the development of this attack method was also included in the article.The investigation is valuable for reference with a certain degree to perform RIPng routing protocols practically and to enhance network security.
出处 《成都大学学报(自然科学版)》 2010年第3期257-260,共4页 Journal of Chengdu University(Natural Science Edition)
关键词 RIPNG 协议分析 RIP 网络攻击 网络安全 RIPng protocol analysis RIP network attack network security
  • 相关文献

参考文献6

  • 1Pei D,Massey D,Zhang L.Detection of Invalid Routing Announcements in Rip Protocol[C] // IEEE Globecom 2003.San Francisco:IEEE Press,2003.
  • 2Wilson C.Protecting Network Infrastructure at the Protocol Level[EB/OL].[2000-12-15].http://www.cs.ucsb.edu/~seclab/projects/routing/references/wilson00protecting.doc.
  • 3Humble.Spoofing RIP[EB/OL].[2004-01-05].http://packetstormsecurity.org/groups/horizon/ripar.txt.
  • 4史创明,刘学莉.RIP路由协议及其漏洞攻击防范[J].微计算机信息,2006,22(02X):7-9. 被引量:7
  • 5Malkin G S.RIPng for IPv6[EB/OL].[1997-01-01].http://www.ietf.org/rfc/rfc2080.txt.
  • 6Malkin G.RIPng Protocol Applicability Statement[EB/OL].[1997-01-05].http://www.ietf.org/rfc/rfc2081.txt.

二级参考文献4

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部