1 / 76
文档名称:

毕业设计(论文)-典型网路环境下路由器攻击与防范.pdf

格式:pdf   页数:76
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

毕业设计(论文)-典型网路环境下路由器攻击与防范.pdf

上传人:3346389411 2013/3/20 文件大小:0 KB

下载得到文件列表

毕业设计(论文)-典型网路环境下路由器攻击与防范.pdf

文档介绍

文档介绍:典型网络环境下路由器攻击与防范

典型网络环境下路由器攻击与防范

摘要

随着计算机技术和通信技术的不断发展,计算机系统已经从独立的主机发展
到复杂,互连的开放式系统,这给人们在信息利用和资源管理上带来了很大的便
利。但同时网络安全问题也日渐突出而且情况越来越复杂。网络安全问题已威胁
到各个领域,保障计算机系统,网络系统及整个信息基础设施的安全已成为刻不
容缓的课题。
本文是基于华为 AR-28 路由器,在对相关理论进行深入研究的基础上,对
路由器攻击做了深入的研究。首先分析华为 AR-28 路由器的基本特点,针对华
为 AR-28 路由器的本身特有配置,使用华为 AR-28 路由器设计典型网络。接着
从 DoS 攻击原理、DoS 攻击分类和 DoS 防范技术三个方面对 DoS 攻防技术进行
了研究。其中主要对 synflooding 洪水攻击技术进行了深入而系统的研究。然后,
深入分析研究了基于路由器的 ARP 攻击原理和实现方法,并且针对攻击设计了
相应的防范方案。最后针对华为 AR-28 路由器本身 VRP 操作系统的特点,对弱
密码用户口令进行破解、攻击。并且针对这一特点,设计防御方案。

关键词:路由器,拒绝服务攻击,synflooding 洪水攻击,ARP 攻击
典型网络环境下路由器攻击与防范

ATTACKING AGAINST AND DEFENCE OF ROUTER
UNDER THE WORK ENVIRONMENT

ABSTRACT

With the development puter technology and munications
technology, computer systems are independent from the mainframe to the open
systems which plex, interconnective. It is very convenient for people to access
the information and resources management. work security has e
increasingly prominent and the situation has e plicated. The issue of
network security is a threat to all fields, to puter systems, network systems
and the entire infrastructure of information security has e a pressing issue.
This paper is based on Huawei AR-28 router. In the theory of in-depth study
which is basised on the attacks of routers, do an in-depth study. First of all, analyze
the basic characteristics of Huawei AR-28 routers. Considering the unique
configuration of Huawei AR-28 routers, design the work environment with
Huawei AR-28 routers themselves. Then from three aspects of the offensive and
defensive technology, the Principle of DoS attacks, the classification of DoS attacks
and the DoS prevention technology, do an in-depth study. Especially, do an in-depth
and systematic research of synflooding attack .After that, based on the analysis of the
router ARP attack theory and methods, do an in-depth analysis. Design and attacks
against the corresponding preventive programs. Finall