Font Size: a A A

The Implementation And Research Of Internet Spoofing Attacks And Prevention

Posted on:2013-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:T N GongFull Text:PDF
GTID:2248330395483882Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet and the various applications carried by it,the networkis used more and more frequently,and more and more problems come out.As a ISP worker forthe after-sales service,usually,it costs a lot of man power and material resources in dealing themaintenance work in the customer network.Internet spoofing attacks is the most of these works,except some unconventional applications(such as P2P Download,Video On Line).These networkspoofing attacks not only are harmful to the network applications of the customers,and theseattacks even can destroy the normal operation of the telecom network.A Internet spoofing attack is one of the most attacking means used by the hacker. Theattacking system makes Internet trust that it is a trusted system when doing a Internet spoofingattack Spoofing attack is essentially an attack that can be authorized by using a fake identity fortrust. This article introduces the theory and process of IP spoofing attack, ARP spoofing attack,DNS spoofing attack, and using the tools related to replay ARP spoofing attack, DNS spoofingattack.IP spoofing scan.On this basis, according to the characteristics of network spoofingattacks,I research and put forward the idea of network spoofing attack prevention and control forall types of customers in the network,through the customers’ re-networking and set the securepolicy of network equipments,we block the communication attacker and normal users, refuse tounauthorized data into the network,and so on,we try to minimize damage and loss.The solutions are meet the the requirements of the application for feasibility and ease ofuse,and shall be implemented to enhance the work efficiency of the customer service team in thecustomer servicing.
Keywords/Search Tags:Internet spoofing attack, ARP spoofing, DNS spoofing, IP spoofing, The defenseof attack
PDF Full Text Request
Related items