IPID隐蔽网络扫描的原理与实现  被引量:1

Theory and implementation of IPID covert network scanning

在线阅读下载全文

作  者:赵秋[1] 胡华平[1] 余海燕[1] 

机构地区:[1]国防科学技术大学计算机学院,湖南长沙410073

出  处:《计算机应用》2005年第4期870-873,共4页journal of Computer Applications

摘  要:介绍了IPID(IPIdentification)隐蔽网络扫描原理,并在Windows操作系统下,设计和实 现IPID隐蔽网络扫描系统原型;为了提高网络扫描效率,提出了“分块二分算法”,并对其进行了性能 分析与比较。研究结果表明,“分块二分算法”是适合IPID隐蔽网络扫描的,而是否合理设置两次取 IPID序列号之间等待的基本延时,将决定IPID隐蔽网络扫描的正确性和扫描速度。The theory of IPID(IP Identification) covert network scanning was introduced,then the design and implementation of IPID covert network scanning under the operation Windows was proposed.In order to improve the efficiency of scanning, the chunk binary algorithm was introduced, then its performance was analyzed and was compared with other algorithm. The results show that the chunk binary algorithm is a good algorithm of IPID covert scanning,and the correctness and speed of IPID covert scanning is decided by setting delay time between getting two IPID.

关 键 词:网络扫描 IPID隐蔽网络扫描 原始套接字 网络嗅探 二分算法 分块二分算法 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象