...
首页> 外文期刊>Computer Communications >TCP/IP security threats and attack methods
【24h】

TCP/IP security threats and attack methods

机译:TCP / IP安全威胁和攻击方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can place the sue of the Internet or intranet at considerable risk. This article classifies a range of known attack methods focusing in a particular on SYN flooding, IP spoofing, TCP sequence number attack, TCP session hijacking, RST and FIN attacks and the Ping O'Death. The article concludes with an examination of the vulnerabilities of the common protocols carried by TCP/IP (including SMTP, Telnet, NTP, Finger, NFS, FTP, WWW and X windows) and proposes configuration methods to limit their vulnerability.
机译:TCP / IP协议套件易受各种攻击的影响,从密码嗅探到拒绝服务。可以在Internet上免费获得执行大多数此类攻击的软件。这些漏洞(除非加以仔细控制)可能会使Internet或Intranet的起诉面临巨大风险。本文对一系列已知的攻击方法进行了分类,特别是针对SYN泛洪,IP欺骗,TCP序列号攻击,TCP会话劫持,RST和FIN攻击以及Ping O'Death。本文以TCP / IP所携带的常见协议(包括SMTP,Telnet,NTP,Finger,NFS,FTP,WWW和X窗口)的漏洞作为结尾,并提出了限制漏洞的配置方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号