期刊文献+

基于Wireshark的IPSec协议抓包分析

下载PDF
导出
摘要 IPSec协议是企业构建虚拟专用网(VPN)连接私有网络时常用的安全协议,在降低成本的同时提高了安全性。阐述了IPSec协议的原理,通过VMware虚拟机搭建VPN环境,基于Wireshark分析软件对互联网安全协议(IPSec)进行抓包,并进行了深入分析,能够帮助网络管理员更好地定位网络协议的问题,防止企业网络受到网络监听攻击。
作者 赵菁
出处 《电脑编程技巧与维护》 2023年第12期32-34,共3页 Computer Programming Skills & Maintenance
  • 相关文献

参考文献1

二级参考文献22

  • 1Cervesato I., Durgin N.A., Lincoln P.D., Mitchell J.C., Scedrov A.. Relating strands and multiset rewriting for security protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, England, 2000, 35~52
  • 2Schneier B.. Applied Cryptography(2nd Edition). New York: John Wileysons, 1996
  • 3Rubin A.D.. Nonmonotonic cryptographic protocols[Ph.D. dissertation]. University of Michigan, Ann Arbor, 1994
  • 4Halpern J.Y., Fagin R.. Modelling knowledge and action in distributed systems. Distributed Computing,1989,3(4):159~179
  • 5Woo T.Y.C., Lam S.S.. A semantic model for authentication protocols. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 178~194
  • 6Marrero W., Clarke E., Jha S.. Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 2000, 9(4): 443~487
  • 7Stoller S.D.. A bound on attacks on payment protocols. In: Proceedings of the 16th Annual IEEE Symposium on Logic in Computer Science(LICS), Boston, Massachusetts, 2001, 61~70
  • 8Paulson L.. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998,6(1): 85~128
  • 9Hopper N.J., Seshia S.A., Wing J.M.. Combining theory generation and model checking for security protocol analysis. Technical Report: CMU-CS-00-107, 2000
  • 10Kindred D.. Theory generation for security protocols[Ph.D. dissertation]. Carnegie Mellon University, 1999

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部