首页> 外文OA文献 >IP spoofing attack and its countermeasures
【2h】

IP spoofing attack and its countermeasures

机译:IP欺骗攻击及其对策

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.
机译:IP欺骗是一种用于获取对计算机的未经授权的访问的技术,入侵者借此将消息发送到具有IP地址的计算机,该IP地址指示该消息来自受信任的主机。它在网络世界中引起了严重的安全问题,目前在信息战中得到了广泛的利用。本文首先通过示例,技术问题和攻击类型来介绍IP欺骗攻击。稍后将详细分析其对策,包括身份验证和加密,过滤和IP追溯。特别是,提出了一种IP回溯机制,即灵活确定性分组标记(FDPM)。由于IP欺骗问题不仅可以通过技术解决,而且还需要社会监管,因此在下文中将讨论法律问题和经济影响。

著录项

  • 作者

    Xiang, Yang; Zhou, Wanlei;

  • 作者单位
  • 年度 2004
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号