期刊文献+

基于MAC欺骗技术的嗅探器原型设计与实现

Design and Implementation of the Sniffer Prototype Based on the MAC Spoofing
在线阅读 下载PDF
导出
摘要 在基于交换环境的局域网内,针对ARP欺骗技术的防御手段日益成熟,导致基于ARP欺骗技术的嗅探器极易受到安全防护软件的拦截与查杀,失去嗅探效果。本文提出了一种非ARP欺骗技术,即MAC欺骗技术,并设计与实现了一种基于MAC欺骗技术的局域网嗅探器原型。与传统ARP欺骗技术相比,这种欺骗技术可以绕过多种ARP防御工具,成功截取网络数据以及对目标主机进行拒绝服务攻击。本文通过采用时间交替机制、过滤机制等多种关键技术,有效地提高了嗅探器的效率和准确率。经过测试,本嗅探器可较好地突破安全防护软件的拦截与查杀,实现嗅探效果。 In the switch-based LAN environment,the means of defending the ARP spoofing is maturing,leading to the sniffer based on the ARP spoofing is vulnerable to being intercepted and killed by security software,so it lacks sniffing effect.In this paper,one non-ARP spoofing,which is called MAC spoofing,is proposed,and a LAN sniffer prototype based on the MAC spoofing is also designed and implemented.Compared with the traditional ARP spoofing,the MAC spoofing can bypass a variety of ARP spoofing defense tools and succeed to intercept the network data,as well as carrying on the Denial of Service attacks.Through the use of a time-alternate mechanism,a filtering mechanism and other key technologies,the efficiency and accuracy of the sniffer can be highly improved.The testing result shows that the sniffer may be better to break through the interception and killing of security software,and achieve the effect of sniffing.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第12期15-18,共4页 Computer Engineering & Science
基金 网络安全与密码技术福建省高校重点实验室开放课题基金资助项目(07A004)
关键词 ARP欺骗 MAC欺骗 交换环境 局域网 嗅探器 ARP spoofing MAC spoofing switch environment LAN sniffer
  • 相关文献

参考文献6

二级参考文献14

  • 1任斌.ARP攻击分析及防御解决方法[J].长春工程学院学报(自然科学版),2008,9(1):77-79. 被引量:8
  • 2严萍,方振汉.以太网监听的原理与防范[J].现代电子技术,2004,27(15):94-95. 被引量:3
  • 3L0pht Heavy Industries. Antisniff Technical Documentation
  • 4Song, D. Dsniff [EB/OL]. http://www. monkey. org/~dugsong/dsniff/.
  • 5Sniffing FAQ[EB/OL].http://www. robertgraham.com/pubs/snif fing-faq.html.
  • 6CONVERY. Hacking Layer 2: Fun with Ethernet Switches[EB/OL]. http://blackhat.com/presentations/bh-usa-02/bh-us-02-convery- switches.pdf , March 2002.
  • 7WHALEN. An Introduction to ARP Spoofing[EB/OL]. http://www.node99.org/projects/arpspoof/arpspoof.pdf, 2001.
  • 8ORNAGHI. Man in the middle attacks Demos[EB/OL]. http://blackhat.com/presentations/bh-usa-03/bh-us-03-ornaghi-valleri.pdf, August 2003.
  • 9郭夏彦.浅谈ARP攻击[J].福建电脑,2009,25(1):46-47. 被引量:2
  • 10王斐人,李毅.简述ARP原理与防范[J].网络与信息,2009(2):37-37. 被引量:4

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部