期刊文献+

基于改进DHCP的IP动态伪装设计与实现

The Design and Implementation of IP Dynamic Masquerading Based on Improved DHCP
下载PDF
导出
摘要 通过IP伪装来迷惑攻击者,从而防止针对特定IP的数据流分析与嗅探。文章分析了Linux系统中IP伪装技术的不足,设计并实现了一种基于改进DHCP针对网络会话的IP动态伪装。改进DHCP通过伪装IP使用频率、客户机和IP描述及IP状态变化来管理分配伪装IP,通过主动探测来确保分配IP的安全性。客户机发起新的网络会话时,通过动态申请伪装IP并跟踪网络会话来实现IP动态伪装。 The discipline of IP masquerading can help to puzzle the attacker's attention and prevent the attacker from getting the valuable information from the IP packets which are identified by IP address by sniffer.This paper presents an implementation of IP dynamic masquerading that is based on improved DHCP and is applied to every network session by analyzing the weakness of IP masquerading in Linux.The improved DHCP manages and distributes masquerading IP dynamically by the frequency of using IP,the description of client and IP,and the state changing of IP.It also makes sure the safety of masquerading IP by active probing.The client masquerades IP of every network session dynamically by applying IP and tracking the network session.
作者 何聚厚
出处 《计算机工程与应用》 CSCD 北大核心 2004年第7期35-37,共3页 Computer Engineering and Applications
基金 国家863高科技研究发展计划项目(编号:2003AA142060) 陕西师范大学校级重点项目
关键词 网络安全 DHCP 动态IP伪装 Network security,DHCP,Dynamic IP masquerading
  • 相关文献

参考文献8

  • 1[1]CERT Coordination Center. CERT Annual Reports[EB/OL].http://www.cert.org, 2003-08
  • 2[2]Yong G,Xinwen F,Wei Zh el al. NetCamo:Camouflaging Network Traffic for Qos-Guaranteed Mission Critical Applications[J].IEEE Transactions on Systems ,2001 ;31 (4) :253~265
  • 3[3]Netfilter/iptables project[EB/OL].http://www.netfilter.org/, 2003-08
  • 4[4]Divert Socket For Linux[EB/OL].http://www.anr.mcnc.org/~divert/,2003-08
  • 5[5]Cohen Fred.A Mathematical Structure of Simple Defensive Network Deceptions[EB/OL].http://all.net/journal/deception/mathdeception/mathdeception.html, 2002-05
  • 6[6]Dynamic Host Configuration Protocol[S].RFC2131,1997-03
  • 7[7]DHCP Options and BOOTP Vendor Extensions[S].RFC2132,1997-03
  • 8[8]Michael Augustus Hogye et al.Analysis of the Feasibility of Keystroke Timing Attacks over SSH Connections[EB/OL].www.cs.virginia.edu/cs588/projects/reports/team4.pdf , 2001-11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部