1 / 31
文档名称:

局域网ARP欺骗攻击及安全防范策略毕业设计.doc

格式:doc   页数:31页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

局域网ARP欺骗攻击及安全防范策略毕业设计.doc

上传人:1006108867 2013/7/29 文件大小:0 KB

下载得到文件列表

局域网ARP欺骗攻击及安全防范策略毕业设计.doc

文档介绍

文档介绍:新疆机电职业技术学院
计算机系毕业论文
题目:
局域网ARP攻击及防范
专业:
计算机网络技术
年级:
高计算机10班
学生姓名:
王文瑞
学号:
20101898
指导教师:
李欣
2012年12月12日
局域网ARP攻击及防范
摘要: ARP攻击,是针对以太网地址解析协议(ARP)的一种攻击技术。此种攻击可让攻击者取得局域网上的数据封包甚至可篡改封包,且可让网络上特定计算机或所有计算机无法正常连接。目前,ARP欺骗是黑客常用的攻击手段之一,且ARP欺骗攻击的后果一般都是比较非常严重的,大多数情况下会造成大面积掉线。有些网管员对此不甚了解,出现故障时,认为PC没有问题,交换机没掉线的“本事”,电信也不承认宽带故障。而且如果第一种ARP欺骗发生时,只要重启路由器,网络就能全面恢复,那问题一定是在路由器了。为此,宽带路由器被认为是“罪魁祸首”,而事实并非如此。鉴于此,本文将论述ARP地址解析协议的含义和工作原理,分析了ARP协议所存在的安全漏洞,分析网段内和跨网段ARP欺骗的实现过程。最后,结合网络管理的实际工作,介绍IP地址和MAC地址绑定、交换机端口和MAC地址绑定、VLAN隔离等技术等几种能够有效防御ARP欺骗攻击的安全防范策略。最后通过使用文中介绍安全防范策略成功阻止P2P终结者、Arpkiller等ARP攻击软件的攻击验证了该安全策略的有效性。
关键词: ARP协议  IP地址  局域网 MAC地址  网络安全
LAN ARP attack and protection
Abstract: ARP attack, which is based on addresses analytical protocol (ARP) an attack technology. This attack may let the attacker has a local-work packets of data or even tamper with the packet, and work on puter or puter cannot normal connection. At present, the ARP deception is monly used attack means one, and the consequences of ARP deception attack is pare very serious, in most circumstances will caused extensive calls. work administrator are not well understood, malfunction, think PC no problem, switches didn't dropped "skill", does not acknowledge broadband fault. And if the first kind of ARP deception occurs, as long as the restart router, work can fully recover, that problem must be on a router. Therefore, broadband router is considered "the chief culprit", but this is not the case. In view of this, this article will be discussed the meaning of ARP address analytical protocol and working principle, analyzes the existing ARP agreement security vulnerabilities, work segment within and across work segment the realization process of ARP deception. Finally, combined with the practical work work management, introduces the IP address and MAC address binding, switch port and MAC address binding, as well as several vlans isolation technology can effectively defense ARP deception attack security preventive st