期刊文献+

ARP欺骗原理及一种防范算法 被引量:26

An Algorithm Against Attacks Based on ARP Spoofing
在线阅读 下载PDF
导出
摘要 分析了ARP欺骗的基本原理和通过ARP欺骗进行攻击的常见方式;讨论了预防ARP欺骗的常见方法及其不足 针对ARP欺骗的"无状态"的特点,提出了一种防范ARP欺骗的算法,给ARP协议添加"先发送ARP请求,后接收ARP应答"的规则,可以有效避免ARP欺骗攻击的发生 ARP Spoofing is one of the most popular network attacking methods, which bring great threats to the security of LAN. This paper analyses the basic theory of ARP spoofing and some common attacking methods using ARP Spoofing. The paper also discusses two preventive methods against ARP Spoofing. According to the 'stateless' property of ARP Spoofing, an preventive algorithm is put forward. By means of adding a rule of 'receiving ARP reply after sending an ARP request', the algorithm can prevent ARP Spoofing attacks effectively and efficiently, and is applicable to those LANs that need higher level of network security.
出处 《江南大学学报(自然科学版)》 CAS 2003年第6期574-577,共4页 Joural of Jiangnan University (Natural Science Edition) 
关键词 ARP欺骗 ARP协议 中间人攻击 网络监听 ARP spoofing ARP man-in-the-middle attack sniffing
  • 相关文献

参考文献5

  • 1RichardStevensW.TCP/IP详解(卷1:协议)[M].北京:机械工业出版社,2000.209-218.
  • 2SEAN WHALEN. An Introduction to ARPS poofing[EB/OL]. http://packetstormsecurity.org/papers/protocols/,2001.
  • 3YURI VOLOBUEV. ARP and ICMP redirection games[EB/OL]. http://www.insecure.org/,1997.
  • 4NEIL B. Riser,Spoofing: An Overview of Some the Current Spoofing Threats[EB/OL]. http://www.sans.org/rr/papers/,2001.
  • 5任侠,吕述望.ARP协议欺骗原理分析与抵御方法[J].计算机工程,2003,29(9):127-128. 被引量:107

二级参考文献3

  • 1Anonymous.网络安全技术内幕[M].北京:机械工业出版社,2000-03..
  • 2StevensWR.TCP/IP详解(卷1):协议[M].北京:机械工业出版社,2001.08.
  • 3AtkinsD.Internet网络安全专业参考手册[M].北京:机械工业出版社,1998.08.

共引文献107

同被引文献118

引证文献26

二级引证文献159

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部