JIMI 发表于 20:51

防御拒绝服务攻击的网络安全机制的应用

论文编号:DZXX040  论文字数:14587,页数:36
摘要
 随着网络技术的飞速发展,网络安全问题也越来越突出。顺应这一趋势,涌现出了许多的网络安全技术,如病毒检测、密码技术、身份认证等。但是,即使如此,还是有很多服务器在不能够及时检测的情况下被攻击,导致了巨大的经济损失。
 拒绝服务攻击,此类攻击的频率和复杂性正在不断上升,近年来得到了学术界和业界的广泛关注,并被认为是目前Internet所面临的最大威胁之一。研究以上课题具有重大的理论和现实意义。
 为了极大限度的发挥网络防火墙的功效,对防火墙进行各种配置,状态查看就成为必然。比如,设置ip地址,设置过滤规则,设置保护主机,查看主机流量,查看攻击种类,查看系统日志等等。而选择合适的控制手段将会大大提高防火墙的防御能力。
关键词  网络安全;拒绝服务攻击;网络防火墙
ABSTRACT
 As the technology of network developing fast, the problem of network security is emerging day by day. In order to temporize this trend, different kinds of network safety methods appear, such as Virus Detecting, Code Technology, id Authentication, etc. Even though, incalculable economic loss are caused because many servers are attacked without effective detecting and defending.
 DoS(Denial of Service)Attack, The frequency and complexity of these attacks are increasing, intrusion detection technologies have got much focus in academic and industry in recent years. DoS attack is regarded as one of the biggest challenges of Internet. The researches on these subjects are of great theoretic and practical significance.
 It becomes necessary to do kinds of configurations and inspect the running status for fully playing the performance of Network Firewall. Such as setting ip address, filter rules, protected hosts and inspecting flows, types of attacking, system logs and so on. Under this situation, it will great improve the defense ability of firewall, as long as you choose a proper control strategy.
 Keywords  Network Security;Denial of Service Attack;Network Firewall
 
  
 
 目录
摘要  I
ABSTRACT  II
第1章 引言  1
1.1 拒绝服务攻击的背景  1
1.2 研究拒绝服务攻击的目的与意义  3
第2章 拒绝服务攻击原理  4
2.1 拒绝服务攻击的原因与原理  4
2.2  TCP/IP协议  6
2.3 拒绝服务攻击的典型流程  7
第3章 拒绝服务攻击的流程解析  9
3.1 获取目标信息扫描系统漏洞  9
3.2 取得控制权限  11
3.3 实施拒绝服务攻击攻击  12
3.4 安装后门程序  13
第4章 基于拒绝服务攻击策略的应用  14
4.1传统应对拒绝服务攻击的策略  14
4.2拒绝服务攻击策略的应用  15
4.3 三层交换机的原理  16
4.4 路由器的配置命令  17
4.5 硬件防火墙  18
4.5.1 硬件防火墙的认识  18
4.5.2 硬件防火墙的配置规则  18
4.5.3 硬件防火墙的配置模式  19
4.5.4 硬件防火墙的基本配置命令  19
第5章 结束语  24
致谢  25
参考文献  26
附录一 三层交换机的汇聚层配置  27
附录二 VLAN的配置  32
页: [1]
查看完整版本: 防御拒绝服务攻击的网络安全机制的应用