首页 | 本学科首页   官方微博 | 高级检索  
     检索      

浅析ARP攻击及相应的交换机防御配置
引用本文:刘海涛.浅析ARP攻击及相应的交换机防御配置[J].邢台职业技术学院学报,2010,27(3):88-90.
作者姓名:刘海涛
作者单位:邢台学院,信息科学与技术系,河北,邢台,054001
摘    要:ARP协议欺骗作为一种交换式局域网中获取数据信息的方法,当用作攻击手段时,给网络安全带来了严重危害。本文针对ARP协议的工作原理作了简单的阐述,并且介绍了ARP病毒的欺骗攻击方法和为了防御此类病毒在交换机上所做的配置。

关 键 词:ARP协议  ARP攻击  防御  交换机  配置

ARP Attacks and the Defensive Switch Configuration
LIU Hai-tao.ARP Attacks and the Defensive Switch Configuration[J].Xingtai Vocational and Technical College,2010,27(3):88-90.
Authors:LIU Hai-tao
Institution:LIU Hai-tao(Information Science and Technology of Xingtai University,Xingtai,Hebei 054001,China)
Abstract:ARP agreement deception,as a local area network in exchange for access to data and information means,when used as means of attack,is a serious safety hazard to the network posed.In this paper,the ARP agreement is simply introduced,and offered ARP virus deceive and attack methods and the configuration installed on the switches to prevent such virus.
Keywords:ARP agreement  ARP attack  defense  switch  configuration
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号