毕业论文
ARP防火墙技术的研究
论文指导老师 信息工程系 学生所在系部 信息工程系 专业名称 网络技术 论文提交日期 年 月 日 论文答辩日期 年 月 日
2015年 月 日
1
论文题目:arp防火墙技术的研究 专 业:网络技术
学 生: 签名: 指导老师: 签名:
摘要
当今的信息社会是建立在计算机网络的基础之上的,网络信息安全形势十分严峻。网络协议安全是网络安全的重要环节,对网络协议的分析、利用越来越受到人们的关注。
ARP协议是网络协议中的基础协议,虽然ARP协议使用起来非常方便快捷,但其中却隐藏着很多漏洞。本文首先对ARP 协议进行了详细的分析,深入了解了ARP 协议的工作原理,并对ARP 欺骗发生的条件和欺骗原理做了深入的介绍,同时总结了ARP 欺骗攻击的检测方法,细致的分析了对各种不同的ARP 欺骗方式相对应的防御手段。
其次针对局域网中出现的 ARP 欺骗的攻击方式进行有针对性的分析,使用抓包工具截获攻击包后进行相关研究,并制定出防御局域网中出现的ARP欺骗的方法,同时对该方法进行适当改进以提高防御效率。
ARP欺骗病毒一直是网络中爆发范围较广且很难根除的顽疾,最近几年针对ARP欺骗病毒的防御研究在不断进行,但由于互联网布局的复杂性特征,很难在防御该病毒方面获得统一的管理和部署,本文提出的检测和防御方法经小范围应用取得了较好的效果,希望在以后的继续学习与研究过程中能够将该方法完善并推广。
【关键词】ARP欺骗,ARP协议,病毒防御
【论文类型】应用 基础
2
Title:Arp firewall technology research Major:Network technology
Name:WangQingFu Signature: Supervisor:LiCuiHong Signature:
Abstract
In today's information society is established on the basis of computer networks, network information security situation is grim. Network security protocol is an important part of network security, network protocol analysis, the use of more and more attention.
ARP protocol is the basic protocol in network protocols, although the ARP protocol to use a very convenient, but it still has many loopholes. This article first has carried on the detailed analysis of ARP protocol, in-depth understanding of the working principle of ARP protocol, and do an in-depth introduction to ARP deception condition and the principle of deception occurs, and summarizes the detection method of ARP spoofing attack, detailed analysis of the corresponding ARP cheating way to various means of defense.
Secondly, the LAN ARP spoofing attack occurred in the way are analyzed, the related study is carried out using the capture tool for capturing the attack packets, and to develop the method of ARP spoofing the emergence of defense in local area network, the method was improved to enhance defense efficiency.
3
ARP cheating virus outbreak has been in the network range is wider and very difficult to eradicate diseases, in recent years the research defence against ARP cheating virus in the ongoing, but due to the complexity of the layout of the characteristics of the Internet, it is difficult to obtain a unified management and deployment in defense of the virus, detection and prevention methods proposed in this paper by small the range of application and achieved good results, I hope in the future to continue to study and research process can take the method to improve and promote the.
[keyword] ARP spoofing, ARP protocol, virus defense [type
of
Thesis]
applied
fundamental
4
目 录
摘 要.................................................................2 目 录.................................................................5 第 1 章 绪 论......................................................6
1.1 课题背景和意义......................................................8 1.2 国内外研究现状......................................................8 1.3 论文的研究内容及组织结构...........................................10 1.3.1 论文的研究内容...................................................10 1.3.2 论文的组织结构...................................................10
第 2 章 ARP 协议..................................................11
2.1 ARP 协议介绍.......................................................11 2.1.1 地址解析的作用...................................................11 2.1.2 直接映射法.......................................................12 2.1.3 动态地址解析法...................................................12 2.1.4 动态地址解析的缓冲区与高效率.....................................13 2.2 ARP 协议的应用.....................................................13 2.2.1 ARP 的标准与历史.................................................13 2.2.2 ARP 地址详述与基本操作...........................................14 2.2.3 ARP 信息的格式...................................................15 2.2.4 ARP 缓存.........................................................17 2.2.5 代理ARP .........................................................18 2.3 ARP 欺骗...........................................................19 2.3.1 ARP 欺骗原理.....................................................19 2.3.2 ARP 欺骗的攻击方式...............................................20 2.3.3 ARP 攻击的检测...................................................21 2.3.4 ARP 病毒的防御...................................................22 2.4 本章小结...........................................................24
第 3 章 ARP 病毒检测与防御.............................24
3.1 遭受ARP 病毒攻击的症状及危害.................................24
3.2 检测与分析.........................................................25 3.2.1 正常网络数据的捕获与分析.........................................25 3.2.2 ARP 欺骗数据包的捕获与分析.......................................26 3.3 ARP 欺骗的防御.....................................................27 3.3.1 针对网关ARP 欺骗的防御...........................................27 3.3.2 针对网内主机ARP 欺骗的防御.......................................28 3.4 ARP 欺骗防御方法的改进.............................................29 3.5 本章小结...........................................................29
总结......... ........................................................29
5
百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说教育文库毕业论文 ARP防火墙技术的研究在线全文阅读。
相关推荐: