期刊文献+

IP欺骗的技术分析及防御措施 被引量:3

Technical Analysis and Defence Policy of IP Spoofing
下载PDF
导出
摘要 本文从IP欺骗中的被假冒的信任主机和目标主机两个方向讲述了IP欺骗的实现,围绕TCP/IP握手机制产生的状态转换体现其内在缺陷,并介绍了相关的防御策略。 Implemention of IP spoofing is addressed in this paper from both imitated trusted host and target host, the drawback of TCP/IP shake-hand protocol is discribed circling its state transition and relevant defence policies are introduced.
出处 《微计算机信息》 2002年第4期71-72,74,共3页 Control & Automation
关键词 IP欺骗 技术分析 防御措施 网络攻击 计算机网络 网络安全 IP spoofing synchronize sequence number denial of service state transition digram defence policy
  • 相关文献

参考文献1

共引文献10

同被引文献9

  • 1W.Richard Stevens著.范建华,胥光辉,张涛,等译.谢希仁校,《TCP/IP详解一卷1:协议》[M].北京,机械工业出版社,2000年4月,第24—27,111—112页.
  • 2S.Savage,D.Wetherall,A.Karlin,T.Anderson.Practical network support for IP traceback[C].In ACM SIGCOMM,Stockholm,Sweden,2000,295-306.
  • 3D.X.Song,A.Perrig. Advanced and authenticated marking schemes for IP traceback[C]. In IEEE INFOCOMM,April 2001.
  • 4N.Haller,"A One-Time Password System" [Z],Internet RFC 2289,February 1998.
  • 5H.Krawczyk,M.Bellare,R.Canetti,"HMAC: Keyed-Hashing for Message Authentication" [Z],Internet RFC 2104,February 1997.
  • 6中国互联网络信息中心.中国互联网络发展状况统计报告.http://www.cn-nic.net.cn,2006.01.28
  • 7Software QA/Test Resource Center.http://www.softwareqatest.com
  • 8Peterson,Lyle J.Petri net theory and the modeling of system.1981.10-13
  • 9Chen Shyi-Ming,Shiau Yuh-Shin.Vague Reasoning and Knowledge Representation Using Extended Fuzzy Petri Nets.Journal of Inforamtion Science and Engineering,1998,14(2):391-408

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部