检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘叶梅 徐龙泉 LIU Yemei;XU Longquan(YGsoft Inc.,Zhuhai 519085,China;Zhuhai Technician College,Zhuhai 519000,China)
机构地区:[1]远光软件股份有限公司,广东珠海519085 [2]珠海市技师学院,广东珠海519000
出 处:《现代信息科技》2022年第24期75-77,81,共4页Modern Information Technology
摘 要:动态主机配置协议(DHCP)欺骗攻击方式绝大部分是欺骗DHCP其他客户端和欺骗DHCP服务器这两种形式,攻击者目的是让DHCP客户端把所有原本要发送给其他客户端设备的信息都发送给攻击者,由此达到中间人攻击的效果或者让新连接的DHCP客户端无法获取到可用IP地址,从而达到拒绝服务攻击的效果。文章介绍了缓解上述两种攻击的方式,即通过对交换机的端口进行区分和在端口上配置限速的DHCP监听(DHCP Snooping)方法来部署与实现。Most of the DHCP spoofing attacks are in two forms: spoofing other DHCP clients and spoofing the DHCP server. The purpose of the attacker is to let the DHCP client send all the information that is originally intended to be sent to other client devices to the attacker. So as to achieve the effect of middleman attack or prevent the newly connected DHCP client from obtaining an available IP address, thereby achieving the effect of a denial of service attack. This paper introduces the ways to mitigate the above two attacks, that is, it is deployed and implemented by distinguishing the ports of switches and configuring speed limited DHCP Snooping on the ports.
关 键 词:DHCP欺骗攻击 DHCP监听 端口区分 端口限速
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.91