期刊文献+

一种网络隧道栈溢出故障的建模分析

原文传递
导出
摘要 0引言隧道技术因实现了不兼容信道上的载荷传输,以及在非受控网络中提供安全通道,而被广泛应用于以太网中。目前已有几十种网络隧道协议,但对隧道协议的研究多集中在协议握手层和传输层安全机制,而对隧道实现框架的共性安全隐患探讨的较少。RFC1326提出环路网络中两种隧道交互封装可导致出现数据包风暴,并讨论了限制跳数和检测报文头的解决方法,发现了隧道技术与特定网络拓扑结构共存时出现的共性隐患问题。
作者 刘晓明
出处 《网络安全技术与应用》 2016年第3期39-40,共2页 Network Security Technology & Application
  • 相关文献

参考文献10

  • 1P.Tsuchiya,Betlcore Mutual Encapsulation Consi-dered Dangerous RFC 792 IETF,May 1992.
  • 2Cisco Systems,Proxy ARP,http://www.cisco.co-m/en/ US/tech/.
  • 3Smoot Carl-Mitchell, John S.Quarterman, "Using ARP to Implement Transparent",RFC1027,lETF,Octobe-r 1987.
  • 4O.Sheyner,siJha,J.M.WinglR.PiLippmann and Haines.Au tomated Generation and Analysis of Attack Graphs[C].2002 I EEE Symposium on Security and Priv-acy.Oakland,California, 2002.
  • 5L.Wang, S.Noel,and S.Jajodia.Minimum-cost netwo-rk hardening using attack graphs.Computer Communicat-ions,29 (18) :3812--3824,11,2006.
  • 6Xinming Ou A logic-programming approach to ne-t work security analysis [Ph.D.Thesis].Princeton University,2()05.
  • 7陈锋,张怡,苏金树,韩文报.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848. 被引量:51
  • 8P.Calhoun, R.Suri, N.Cam-Winget, et al,'Lightweight Access Point Protocol ".RFC5412,1ETF,February 2010.
  • 9常潘.Cisco无线局域鼹配置基础.电子工业出版社,2011.
  • 10詹宏强,陈盛荣.针对GTP协议的攻击及防御综述[J].通信技术,2007,40(8):43-45. 被引量:5

二级参考文献27

  • 1Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 2Swiler LP,Phillips C,Ellis D,Chakerian S.Computer-Attack graph generation tool.In:Proc.of the 2nd DARPA Information Survivability Conf.& Exposition.Los Alamitos:IEEE Computer Society Press,2001.307-321.
  • 3Lippmann RP,Ingols KW.An annotated review of past papers on attack graphs.Technical Report,ESC-TR-2005-054,MIT Lincoln Laboratory,2005.
  • 4Ritchey R,Ammann P.Using model checking to analyze network vulnerabilities.In:Proc.of the 2000 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2000.156-165.
  • 5Sheyner O,Jha S,Wing JM,Lippmann RP,Haines J.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 6Jha S,Sheyner O,Wing J.Two formal analyses of attack graphs.In:Proc.of the 15th IEEE Computer Security Foundations Workshop.Cape Breton:IEEE Computer Society,2002.49-63.
  • 7Ou XM,Boyer WF,McQueen MA.A scalable approach to attack graph generation.In:Proc.of the 13th ACM Conf.on Computer and Communications Security.Alexandria:ACM Press,2006.336-345.
  • 8Ou XM.A logic-programming approach to network security analysis[Ph.D.Thesis].Princeton:Princeton University,2005.
  • 9Ammann P,Wijesekera D,Kaushik S.Scalable,graph-based network vulnerability analysis.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002.217-224.
  • 10Jajodia S,Noel S,O'Beny B.Topological analysis of network attack vulnerability.In:Kumar V,Srivastava J,Lazarevic A,eds.Proc.of the Managing Cyber Threats:Issues,Approaches and Challenges.Netherlands:Kluwer Academic Publisher,2003.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部