期刊文献+

TCP下IP欺骗的研究 被引量:2

Study on IP Spoofing under TCP
下载PDF
导出
摘要 IP欺骗是常用的一种攻击手段。在存在信任关系的网络中,IP欺骗能够伪装成为合法用户,取得一般用户甚至超级用户的权限,危害甚大。本文分析了这种攻击的实现原理,并提出了针对这种攻击的检测方法和防御技术,另外对IP欺骗和IP劫持进行了比较。 IP spoofing is a common but complex attacking method.In the network having trust relationships,with IP spoofing you can get the right of ordinary user,and even that of root.In this paper the principle of this kind of attack is analyzed,the attack detecting technology and the protecting measures against IP spoofing are also given.And still we discuss the difference between IP spoofing and IP hijacking.
出处 《现代计算机》 2001年第4期36-39,共4页 Modern Computer
关键词 TCP IP欺骗 信任关系 防火墙 网络安全 INTERNET 计算机网络 IP TCP IP spoofing Trust relationship
  • 相关文献

参考文献1

二级参考文献8

  • 1Braden R.Requirements for Internet hosts-communication layers[]..1989
  • 2IP Spoofing Attacks and Hijacked Terminal Connections. CERT ADVISORY CA-95-01 . 1995
  • 3Shimomura T.Technical Details of The Attack Described by Markoff in NYT[]..1995
  • 4SM Bellovin.Security problems in the TCP/IP protocol suite[].Computer Communications.1989
  • 5Wright G R,Stevens W R.TCP/IP Illustrated,Vol2,The I mplementation[]..1995
  • 6COMER D E.Internetworking With TCP/IP VOL I: Principles,Protocols,and Architecture[]..1995
  • 7W. Richard Stevens.Tcp/IP Illustrated, Volume I, The Protocols[]..1994
  • 8Postel J,Reynolds J.Telnet Protocol Specification[]..1983

共引文献9

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部