首页 | 本学科首页   官方微博 | 高级检索  
     检索      

端口扫描与反扫描技术研究
引用本文:张登银,许芳颂.端口扫描与反扫描技术研究[J].南京邮电大学学报(自然科学版),2005,25(6):54-58.
作者姓名:张登银  许芳颂
作者单位:南京邮电大学,计算机学院,江苏,南京,210003;南京邮电大学,计算机学院,江苏,南京,210003
基金项目:国家高科技“八六三”计划(2004AA775053)资助项目
摘    要:对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。随着技术的发展,出现了越来越多的扫描工具,不仅能进行普通扫描,还能实现隐蔽扫描,对目标系统安全造成严重隐患。首先讨论了目前常用的端口扫描技术及其特点,并对这种基于空闲主机的隐蔽端口扫描方法进行详细分析。通过对端口扫描和反扫描技术的研究,提出了一种有效防御空闲主机扫描的改进方案,并给出了具体实现策略和测试结果。这种改进方案不仅能有效防御常规的端口扫描,也能有效防御SYN隐蔽扫描。

关 键 词:端口扫描  网络安全  防火墙
文章编号:1000-1972(2005)06-0054-05
修稿时间:2004年11月16

Research on Port-Scanning and Anti-Scanning Technology
ZHANG Deng-yin,XU Fang-song.Research on Port-Scanning and Anti-Scanning Technology[J].Journal of Nanjing University of Posts and Telecommunications,2005,25(6):54-58.
Authors:ZHANG Deng-yin  XU Fang-song
Institution:ZHANG Deng-yin,XU Fang-songCollege of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
Abstract:Scanning a port of the target system is the first step that network intruders will do before entering the system.With technical advancement,more and more port-scanners have been generated.The port-scanner that can not only process common port scanning but also run secret port-scanning has led to great damages to network security.In this paper,all kinds of popular port-scanning technology and its characteristics is discussed at first,and then the technique of secret port scanning based on the leisure computer system is closely analyzed.Based on the study of port-scanning and anti-scanning technology,we propose an improved scheme to defense the port-scanning based on the leisure computer system.Finally,we present particular implementation strategy and experiment results.The improved strategy can defense both common port-scanning and the secret scanning with the symbol of SYN.
Keywords:Port-Scanning  Network security  Fire wall
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号