期刊文献+

浅议ARPS poof攻击

Analyze on ARP Spoof Attack
下载PDF
导出
摘要 存储于主机内存中的地址解析协议(ARP)根据48位的以太网地址确定接口,可高速缓存IP和硬件MAC的映射表,计算机接受到ARP应答数据包即会更新本地ARP缓存。ARP缺陷攻击方式有假冒ARP应答,自动定时ARPSpoof,预测ARP解析时间,对网关攻击,点对点攻击等。对于ARP的预防,须建立在IP地址与MAC地址两者的信任基础上。 Address resolution protocol (ARP) stored in the memory of the host computer can confirm the interface according to the Ethernet addresses of 48 bits, and can quickly save IP and mapping form of hardware MAC. When computer received data package of ARP response, it upgrades local ARP buffer memory immediately. There are many ARP defect attack ways such as imitated ARP response, automatic timing of ARP spoof, predicting analysis time of ARP, gateway attacking and point-to-point attack etc. The prevention of ARP must be set up in the basis of trusting IP address and MAC address.
出处 《兵工自动化》 2006年第4期27-27,共1页 Ordnance Industry Automation
关键词 ARPS poof IP 地址 MAC
  • 相关文献

参考文献1

  • 1宋英辉.日本刑事诉讼法[M]中国政法大学出版社,2000. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部