期刊文献+

隐藏IKE协商端口方法研究 被引量:1

Research on Hiding IKE Negotiation Port
下载PDF
导出
摘要 互联网密钥交换(Internet Key Exchange,IKE)协商端口为用户数据报协议(User Datagram Protocol,UDP)的500端口和4500端口,攻击者根据端口很容易发现IKE的协商包,并可根据截获的协商包,对协商过程进行破坏和攻击。因此,文章提出一种隐藏IKE协商端口的方法,可以防止攻击者轻易发现并截获IKE协商包,从而保护系统安全。 Internet Key Exchange(IKE) negotiation ports are ports 500 and 4500 of the User Datagram Protocol(UDP). Attackers can easily find IKE negotiation packets based on the ports, and can damage and attack the negotiation process based on the intercepted negotiation packets. This paper proposes a method to hide IKE negotiation port, which can prevent attackers from easily finding and intercepting IKE negotiation packets, and protect system security.
作者 曾鹤 王宇 ZENG He;WANG Yu(The 30th Research Institute of China Electronics Technology Group Corporation,Chengdu Sichuan 610041,China)
出处 《信息与电脑》 2022年第21期200-202,共3页 Information & Computer
关键词 隐藏 互联网密钥交换(IKE) 协商端口 hide Internet Key Exchange(IKE) negotiation port
  • 相关文献

参考文献10

二级参考文献39

  • 1刘志煌,余永权,刘滔.在扩频中引入OFDM实现PLC高速通信的方案[J].计算机工程与设计,2005,26(3):716-718. 被引量:3
  • 2[1]Katzenbeisser S,Petitcolas F A P.Information Hiding Techniques for Steganography and Digital Watermarking.Arctec House,2000,北京:人民邮电出版社,2001 被引量:1
  • 3[4]Lee H C J,Thing V L L.Port Hopping for Resilient Networks.VTC2004-Fall,IEEE,2004 被引量:1
  • 4[6]Thompson,et al.Wide-Area Internet Traffic Patterns and Characteristics.IEEE Networks,Nov/Dec 1997,11(6) 被引量:1
  • 5KAUFMAN C. Internet Key Exchange (IKEv2) Protocol[EB/OL]. http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-14.txt, 2004 . 被引量:1
  • 6RADIA P, KAUFMAN C. Analysis of the IPSec Key Exchange Standard[A]. Sixth International Workshop on Enterprise Security[C], 2001. 被引量:1
  • 7KENT S, ATKINSON R. Security Architecture for the Internet Protocol[EB/OL]. http://www.ietf.org/rfc/rfc2401.txt, 1998. 被引量:1
  • 8BLUNK L, VOLLBRECHT J. PPP Extensible Authentication Protocol (EAP)[EB/OL]. http://www.ietf.org/rfc/rfc2284.txt, 1998. 被引量:1
  • 9S. Katzenbeisser and F.A.P. Petitcolas, editors, Information Hiding:Techniques for Steganography and Digital Watermarking[M]. Artech House,2000. 被引量:1
  • 10C. H. Rowland.Covert channels in the TCP/IP protocol suite[M].First Monday, 1996. 被引量:1

共引文献39

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部