摘要
本文从IP欺骗中的被假冒的信任主机和目标主机两个方向讲述了IP欺骗的实现,围绕TCP/IP握手机制产生的状态转换体现其内在缺陷,并介绍了相关的防御策略。
Implemention of IP spoofing is addressed in this paper from both imitated trusted host and target host, the drawback of TCP/IP shake-hand protocol is discribed circling its state transition and relevant defence policies are introduced.
出处
《微计算机信息》
2002年第4期71-72,74,共3页
Control & Automation
关键词
IP欺骗
技术分析
防御措施
网络攻击
计算机网络
网络安全
IP spoofing synchronize sequence number denial of service state transition digram defence policy