期刊文献+

IP欺骗原理分析 被引量:5

The Analysis of the Principle of IP Spoofing
下载PDF
导出
摘要 IP欺骗是一种复合型网络攻击技术。它将IP地址伪造技术、TCPSYN洪流攻击技术与TCP序列号猜测技术融为一体,并且在攻击过程中利用了具有信任关系的主机间采取的基于地址的认证方式。论文在介绍TCP/IP相关知识的基础上对IP欺骗的原理进行了全面、详尽的分析。 IP spoofing is a complex network attacking technique which contains IP address forgery,TCP SYN flooding and TCP sequence number guessing.Moreover,the attacker makes use of address-based authentication form between the hosts with the trust relationship in the attacking procedure.This paper firstly introduces the knowledge of TCP/IP and then analyses the principle of IP spoofing in detail.
作者 任侠 吕述望
出处 《计算机工程与应用》 CSCD 北大核心 2003年第23期166-169,共4页 Computer Engineering and Applications
关键词 IP欺骗 IP地址伪造 TCP序列号猜测 TCP SYN洪流 信任关系 IP spoofing,IP address forgery,TCP sequence number guessing,TCP SYN flooding,Trust relationship
  • 相关文献

参考文献7

  • 1DEREK ATKINS 严伟(译).Internet网络安全专业参考手册[M].北京:机械工业出版社,1998..
  • 2W.Richard.Steven.TCP/IP详解卷1:协议[M].机械工业出版社,2001-08..
  • 3Robert T Morris.A Weakness in the 4.2BSD Unix TCP/IP Software[M] AT&T Bell Laboratories, 1985--02-25.
  • 4Tsutomu Shimomura.Shimomura's e-mail.URL:http://www.network- computing.com/unixworld/security/001 .add.html, 1995-01.
  • 5Fred Cohen.Internet Holes-Eliminating IP Address Forgery[J].Network Security, 1996-05.
  • 6S M Bellovin.Security Problems in the TCP/IP Protocol Suite[J]. Computer Communication Review, 1989; 19(2 ).
  • 7S M Bellovin.RFC1948-Defending Against Sequence Number Attacks [S]. 1996--05.

共引文献8

同被引文献12

  • 1王绍卜.IP欺骗原理分析与防范对策[J].河北理工学院学报,2004,26(3):57-60. 被引量:1
  • 2张建青,谢凤梅.IP欺骗技术及防范[J].电脑知识与技术,2005(7):23-25. 被引量:3
  • 3蔡凌.IP欺骗攻击[J].网络安全技术与应用,2006(1):28-30. 被引量:4
  • 4程小鸥,梁意文.防IP欺骗的多样性方法[J].计算机应用研究,2006,23(8):104-106. 被引量:1
  • 5谢希仁.计算机网络(第四版)[M].电子工业出版社.2005/06
  • 6郭世泽,高永强,郝叶力,等.揭开黑客的面纱[M].北京:人民邮电出版社,2003.
  • 7Yaar, Abraham, Perrig. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense [J]. IEEE Journal on Selected Areas in Communications, 2006, 24 (10): 1853 - 1863.
  • 8Santiraveewan, Voravud, Permpoontanalarp. A graph - based methodology for analyzing IP spoofing attack[ C]. Proceedings - InternationalConference on Advanced Information Networking and Application (AINA), 2004,2:227 - 230.
  • 9Wei Chen, Dit - Yah Yeung. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing [C]. IEEE Computer Society, 2006,4:38 - 39.
  • 10张洁,武装,陆倜.一种改进的ARP协议欺骗检测方法[J].计算机科学,2008,35(3):52-54. 被引量:11

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部