首页 | 本学科首页   官方微博 | 高级检索  
     

IP欺骗攻击技术原理、方法、工具及对策
引用本文:蒋卫华,李伟华,杜君. IP欺骗攻击技术原理、方法、工具及对策[J]. 西北工业大学学报, 2002, 20(4): 544-548
作者姓名:蒋卫华  李伟华  杜君
作者单位:西北工业大学,计算机科学与工程系,陕西,西安,710072
基金项目:国家高技术研究发展计划 (八六三计划 ) (2 0 0 1AA142 10 0 ),教育部博士点基金,航空科学基金 (0 2 F5 30 35 ),西北工业大学青年科技创新基金
摘    要:IP欺骗技术(IP Spoofing)起源较早,应用十分广泛。但黑客可以利用IP欺骗技术截断正常的TCP通信,或被目标主机所信任的机器向其发起TCP连接。中介绍了IP欺骗技术的原理、方法以及常用工具,分析了在现有条件下解决这一问题的策略,并提出了建立高级模式匹配策略来进行入侵检测的方法,该方法可以有效地防御和检测IP欺骗攻击。

关 键 词:技术原理 IP欺骗攻击 入侵检测 模式匹配 网络安全
文章编号:1000-2758(2002)04-0544-05
修稿时间:2002-01-16

IP Spoofing Attack: Principles, Methods,Tools and Countermeasures
Jiang Weihua,Li Weihua,Du Jun. IP Spoofing Attack: Principles, Methods,Tools and Countermeasures[J]. Journal of Northwestern Polytechnical University, 2002, 20(4): 544-548
Authors:Jiang Weihua  Li Weihua  Du Jun
Abstract:IP (Internet Protocol) spoofing was first introduced in 1985. By IP spoofing and TCP (Transport Control Protocol) sequence number prediction, hackers can gain unauthorized access to remote machines. The existing firewalls and IDS (Intrusion Detection System) cannot solve the problem completely. In this paper, we first introduce the principles, methods, and tools of IP spoofing. Then through the tests on our local area network, we analyze the technical features and approaches of IP spoofing attacks, and provide the countermeasures to reduce the possibility of such attacks, including the configuration of boundary routers, adoption of encrypted protocols, and building intelligent pattern matching strategies. These methods can effectively detect and prevent prevalent IP spoofing attacks.
Keywords:IP spoofing attack   intrusion detection   pattern matching  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号