首页 | 本学科首页   官方微博 | 高级检索  
     检索      

互联网假冒源地址攻击的分类
引用本文:栗培国,毕军,姚广.互联网假冒源地址攻击的分类[J].清华大学学报(自然科学版),2009(8).
作者姓名:栗培国  毕军  姚广
作者单位:清华大学信息网络工程研究中心;清华信息科学与技术国家实验室;
基金项目:国家“九七三”重点基础研究发展计划(2009CB320501);;国家“十一五”科技支撑计划(2008BAH37B02)
摘    要:假冒源地址攻击具有容易实施、不易被追溯的特点,这种攻击行为在互联网上日益猖獗。该文总结了互联网假冒源地址问题、探索其攻击的各种形式、分析其带来的危害。将假冒源地址攻击用3个基本要素描述为:攻击者A,攻击目标V和被假冒主机H。根据H与A和V的相对拓扑结构,将假冒源地址攻击归纳为在网外H0、攻击目标H1、攻击目标子网H2、攻击者子网H3、攻击者与攻击目标路径上H4及其他H56类。这将有助于清晰地理解真实地址问题,指导假冒源地址防御技术的设计,为建立保证源地址真实性的互联网体系结构奠定基础。

关 键 词:假冒源地址  攻击分类  IP伪造  

Classification of source address spoofing in the Internet
LI Peiguo,BI Jun,YAO Guang.Classification of source address spoofing in the Internet[J].Journal of Tsinghua University(Science and Technology),2009(8).
Authors:LI Peiguo  BI Jun  YAO Guang
Institution:Tsinghua National Laboratory for Information Science and Technology;Network Research Center;Tsinghua University;Beijing 100084;China
Abstract:Source address spoofing has become a widely used mechanism for attacks because it can be easily launched and is difficult to defend against and trace. Therefore,the classification of network attacks based on source address spoofing is very important.This paper presents a survey of the modes of source address spoofing and their effect on the Internet.The source address spoofing attacks are related to the attacker,the victim and the spoofed host.Source address spoofing attacks can be classified into six categ...
Keywords:source address spoofing  classification of attacks  IP spoofing  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号