期刊文献+

关于ARP协议应用的几点研究和实现 被引量:4

Several Research and Implementation of Applications based on ARP Protocol
下载PDF
导出
摘要 Internet是从友好、信任、开放的环境中发展起来的,其协议的实现有着其固有的缺陷,清晰地掌握网络互联通信的底层原理,是研究网络安全的基础和关键。本文从以太网网络通信中ARP协议的工作原理出发,首先介绍了利用该协议进行的局域网活动主机检测、绑定MAC的局域网IP保护方案的原理和实现,然后分析介绍了ARP协议的不足之处,以及在此基础之上所产生的ARP欺骗,并将其应用到交换网环境中,以桥接的方式实现了交换环境下的网络监听,最后给出了该欺骗的检测以及防御办法,同时给出了一个相应的实现系统。 Internet was developed from a friendly, reliable and open environment. The realization of its protocols has its inherent limitation. Clearly mastering the substrate principle of network interconnection and communication is the base and hinge to study the network security. From the working principle of ARP protocol in the network communication of Ethernet, this paper firstly introduces the principles and implements of Active Host Detection and IP Protection in LAN based on ARP. Secondly, it introduces and analyzes the deficiency of ARP protocol and the ARP spoof produced by this deficiency. It also applies this analysis to the switcher net environment and realizes the network monitoring by the bridge method. Finally, it presents the detection of this spoof and the defense measure, and at the same time, a corresponding realized system is also given.
出处 《现代计算机》 2004年第2期37-41,55,共6页 Modern Computer
基金 本文的研究得到了江苏省应用研究基础项目(BJ000002) 教育部"跨世纪优秀人才培养计划"基金项目 "江苏省网络与信息安全重点实验室"的资助。
关键词 ARP协议 网络安全 MAC 网络监听 地址解析协议 ARP ARP Spoof Sniffer
  • 相关文献

参考文献12

  • 1S.M.Bellovin. Security Problem in the TCP/IP Protocol Suite. Computer Communications Review, 1989 (2).
  • 2S.Carl-Mitchell and J.S.Quarterman. Using ARP to Implement Transparent Subnet Gateways.RFC 1027,October 1987.
  • 3R.Droms. Dynamic. Host Configuration Protocol. RFC 2131,March 1997.
  • 4Gary R.Wright and W.Richard Stevens. TCP/IP Illustrated,Volume 2. The Implementation,Addison-Wesley,1995.
  • 5W.Richard Stevens. TCP/IP Illustrated Volume 1. The Protocols, Addison-Wesley Professional Computing Series,1994.
  • 6Computer Emergency Response Team, CERT Advisory. IP Spoofing Attacks and Hijacked Terminal Connections, January 23,1995.
  • 7Angus Mackinnon, Tony MoGregor, and James Brecn.Overview of Intemet Protocol Security. Technical Report 94-10,Monash University, Australia, October 27,1994.
  • 8Tripunitara, M.V.; Dutta, P. Middleware Approach to Asynchronous and backward Compatible Detection and Prevention of ARP Cache Poisoning. Computer Security Applications Conference, 1999. (ACSAC 99) Proceedings. 15th Annual, 1999.
  • 9Y.Volobuev. Playing Redir Games with ARP and ICMP. The BUGTRAQ Mailing List. http://www.goth.net/ice-burg/tcp / arp.games.html.September 1999.
  • 10AnonymousJohnRay 汪辉 张冕洲 译.Linux安全最大化[M].北京:电子工业出版社,..

同被引文献7

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部