首页 | 本学科首页   官方微博 | 高级检索  
     

IPID隐蔽网络扫描的原理与实现
引用本文:赵秋,胡华平,余海燕. IPID隐蔽网络扫描的原理与实现[J]. 计算机应用, 2005, 25(4): 870-873. DOI: 10.3724/SP.J.1087.2005.0870
作者姓名:赵秋  胡华平  余海燕
作者单位:国防科学技术大学,计算机学院,湖南,长沙,410073;国防科学技术大学,计算机学院,湖南,长沙,410073;国防科学技术大学,计算机学院,湖南,长沙,410073
摘    要:介绍了IPID(IPIdentification)隐蔽网络扫描原理,并在Windows操作系统下,设计和实 现IPID隐蔽网络扫描系统原型;为了提高网络扫描效率,提出了“分块二分算法”,并对其进行了性能 分析与比较。研究结果表明,“分块二分算法”是适合IPID隐蔽网络扫描的,而是否合理设置两次取 IPID序列号之间等待的基本延时,将决定IPID隐蔽网络扫描的正确性和扫描速度。

关 键 词:网络扫描  IPID隐蔽网络扫描  原始套接字  网络嗅探  二分算法  分块二分算法
文章编号:1001-9081(2005)04-0870-04

Theory and implementation of IPID covert network scanning
ZHAO Qiu,HU Hua-ping,YU Hai-yan. Theory and implementation of IPID covert network scanning[J]. Journal of Computer Applications, 2005, 25(4): 870-873. DOI: 10.3724/SP.J.1087.2005.0870
Authors:ZHAO Qiu  HU Hua-ping  YU Hai-yan
Affiliation:School of Computer Science,National University of Defense Technology
Abstract:The theory of IPID(IP Identification) covert network scanning was introduced,then the design and implementation of IPID covert network scanning under the operation Windows was proposed.In order to improve the efficiency of scanning, the chunk binary algorithm was introduced, then its performance was analyzed and was compared with other algorithm. The results show that the chunk binary algorithm is a good algorithm of IPID covert scanning,and the correctness and speed of IPID covert scanning is decided by setting delay time between getting two IPID.
Keywords:network scanning  IPID covert network scanning  raw socket  sniffer  binary algorithm  chunk binary algorithm
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号