首页 | 本学科首页   官方微博 | 高级检索  
     

IP欺骗攻击的原理、实现与防范
引用本文:李佳音.IP欺骗攻击的原理、实现与防范[J].电脑编程技巧与维护,2009(2):87-89.
作者姓名:李佳音
作者单位:东北大学秦皇岛分校计算机工程系,秦皇岛,066004
摘    要:IP欺骗利用IP协议本身的缺陷,利用信任主机之间的访问控制漏洞来实施攻击。本文深入剖 析了IP欺骗的原理,分析了IP欺骗攻击的实现过程和特征,并在此基础上给出了一些检测防范措施。

关 键 词:访问控制  IP协议  IP欺骗攻击  漏洞  网络安全

IP Spoofing Attack: Principles, Implementation and Guards Against the Measure
LI Jiayin.IP Spoofing Attack: Principles, Implementation and Guards Against the Measure[J].Computer Programming Skills & Maintenance,2009(2):87-89.
Authors:LI Jiayin
Affiliation:LI Jiayin (Computer Engineering Department of Northeastern University, Qinhuangdao 066004)
Abstract:IP Spoofing attack takes effect by using the self-bugs of IP protocol and the loophole of access controlling be-tween trust hosts.This paper describes and deeply analyzes the technical principles,the characters and the executive pro-cess of IP Spoofing network attack.Based on the analysis,it presents some methods to prevent this kind of attacks.
Keywords:Access Control  IP Spoofing
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号