期刊文献+

网上IP劫持攻击的研究 被引量:10

Study on IP Hijack
下载PDF
导出
摘要 当前 ,网上出现了一种基于 TCP的主动攻击 ,称为 IP劫持 .这种攻击不同于以往的基于网络侦听的被动式网络攻击 ,它能绕过系统口令和 S/ KEY口令保护的防御 ,将网络连接完全接管 ,对网络安全造成了重大威胁 .该文分析了这种攻击的实施原理 。 There is a kind of active attack based on TCP over the Internet, which is called IP Hijack. This kind of attack is different from the passive attack based on network sniffing. It can bypass the protection of system password and S/KEY, and get full control of the link between two end points. This can cause great harm to the network system. In this paper, the principle of this kind of attack is analyzed, the attack detecting technology and the protecting measures against IP Hijack are also given.
出处 《软件学报》 EI CSCD 北大核心 2000年第4期515-519,共5页 Journal of Software
基金 国家863高科技项目基金!(No.86 3-306-ZT02-03-01)资助
关键词 IP劫持 网络监视器 INTERNET网 网络安全 IP, TCP, IP hijack, network monitor, link desynchronization.
  • 相关文献

参考文献8

  • 1Braden R.Requirements for Internet hosts-communication layers[]..1989
  • 2IP Spoofing Attacks and Hijacked Terminal Connections. CERT ADVISORY CA-95-01 . 1995
  • 3Shimomura T.Technical Details of The Attack Described by Markoff in NYT[]..1995
  • 4SM Bellovin.Security problems in the TCP/IP protocol suite[].Computer Communications.1989
  • 5Wright G R,Stevens W R.TCP/IP Illustrated,Vol2,The I mplementation[]..1995
  • 6COMER D E.Internetworking With TCP/IP VOL I: Principles,Protocols,and Architecture[]..1995
  • 7W. Richard Stevens.Tcp/IP Illustrated, Volume I, The Protocols[]..1994
  • 8Postel J,Reynolds J.Telnet Protocol Specification[]..1983

同被引文献41

引证文献10

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部