1 / 24
文档名称:

毕业论文,学校网络安全探究,毕业设计.doc

格式:doc   页数:24页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

毕业论文,学校网络安全探究,毕业设计.doc

上传人:286919636 2015/2/25 文件大小:0 KB

下载得到文件列表

毕业论文,学校网络安全探究,毕业设计.doc

文档介绍

文档介绍:论文题目:宿舍网络安全探究
专业:电子信息技术工程
准考证号:
学生姓名:宫野
指导教师:秦贵和

2012 年 3月 7 日
宿舍网络安全探究
摘要
是一个开放的、互操作的通信系统,其基础协议是TCP/IP。协议地址(简称IP地址)是TCP/IP网络中可寻址设施的唯一逻辑标识,它是一个32位的二进制无符号数。上的任一主机,它都必须有一个唯一的IP地址。IP地址由InterNIC及其下级授权机构分配,。
的迅速发展,IP地址的消耗非常快,据权威机构预测,现行IPv4版本的IP只够用到2007年。现在,企业、机构、个人要申请到足够的IP地址都非常困难,作为一种稀缺资源,IP地址的盗用就成为很常见的问题。网络,由于费用是按IP地址进行统计的,许多用户为了逃避网络计费,用IP地址盗用的办法,将网络流量计费转嫁到他人身上。另外,一些用户因为一些不可告人的目的,采用IP地址盗用的方式来逃避追踪,隐藏自己的身份。
网络的正常用户的权利,并且给网络计费、网络安全和网络运行带来了巨大的负面影响,因此解决IP地址盗用问题成为当前一个迫切的课题。
IP地址的盗用方法多种多样,其常用方法有很多种,例如静态修改IP地址、成对修改IP-MAC地址等等,针对IP盗用问题,。
关键词:通信系统 IP地址盗用
work security explored
Pick to
is an open, munications system, its basic agreement is TCP/IP. protocol address (hereinafter referred to as the IP address) is TCP/work addressable facilities of the only logical logo, it is a 32-bit binary unsigned number. For the of any one of the host, it must have a unique IP address. IP address and its anization by InterNIC at a lower level distribution, not assigned to own the IP address of host can't directly connected to the .
With the rapid development of , the consumption of IP address is very fast, according to authorities forecast, the current IPv4 version of the IP only enough to 2007. Now, enterprises, institutions and individuals who want to apply for to enough IP address is very difficult, as a scarce resource, the IP address for theft will e mon problem. Especially in the IP flow of billing work, because of cost is according to the IP address of the statistics, many users in order to work billing, with IP address to the theft, network flow billing passed on to others. In addition, some users because some ulterior purpose, USES the IP address of the theft way to avoid tracking, to hide their identity.
IP address infringement of work theft of normal user rights, and to work billing, network security work operation brings huge negative effects, therefore solve the IP address theft problem currently e a pressing issue.
T