毕业设计(论文)ARP病毒的攻击与防范.doc
《毕业设计(论文)ARP病毒的攻击与防范.doc》由会员分享,可在线阅读,更多相关《毕业设计(论文)ARP病毒的攻击与防范.doc(57页珍藏版)》请在三一办公上搜索。
1、XXXXXXXX专科毕业设计(论文) 题 目 ARP病毒的攻击与防范学生姓名 XXXXX 专业班级 07信息安全技术二班 学 号 XXXXXXXX 系 别 计算机系 指导教师(职称) XXXXXXX 完成时间 2010年4月10日 ARP病毒的攻击与防范摘 要ARP攻击是指黑客利用ARP协议缺陷的基本原理,通过在区域内一台终端或服务器上发布欺骗ARP广播包以达到进行盗取用户帐号、篡改网站内容、嵌入恶意代码、发布不良信息、监听传输数据等非法活动的目的。ARP欺骗原理在过去常被运用到简单的拒绝服务攻击中。然而,随着大量缺乏管理且使用者流动性较大的网吧与其他公共上网环境的普及,互联网上开始出现许多由
2、ARP基本攻击与侦听、网页篡改等黑客技术相互结合的攻击方式。这种ARP攻击之所以能在各类公共上网设施内迅速蔓延是因为在拥有上千台机器的公众上网环境或对外服务的IDC托管机房中,同一网段中往往有着来自不同单位或不同人群使用的各类终端与服务器,由于其中各类系统的安全责任点归属复杂、使用人员流动性大,造成环境内安全管理漏洞较大、安全盲点较多,从而使新一代以ARP欺骗为基础的网页挂码或重定向攻击得以滋生。而且,ARP攻击相对与通常攻击方式可能造成的更大的破坏在于:一般来说IP地址的冲突可以通过多种方法和手段来避免,而ARP协议工作在更底层协议上,隐蔽性更高。系统并不会判断ARP缓存的正确与否,无法像I
3、P地址冲突那样给出提示。很多黑客工具可以随时发送ARP欺骗数据包和ARP恢复数据包,这对于公众上网环境来说,就可以在任何权限的终端计算机上通过发送ARP数据包的方法来控制网络中任何一台计算机甚至服务器或网络设备的网络连接、侦探通讯数据、篡改数据包以加入病毒代码或不良信息进行传播。黑客还可以最大化的利用ARP欺骗原理,将其与其他攻击方法组合后运用于多种攻击,如,侦听、拒绝服务、挂载病毒等。从而达到多种攻击目的,如:窃取信息、病毒传播、破坏网络路由,暴力广告等等。从对于ARP攻击的防范角度来说,ARP攻击的防范也比一般网络安全防范更加困难。因为ARP广播协议本身存在的缺陷,使得即使一个网吧或网站系
4、统管理员能保证自己的服务器与网络交换设备本身没有漏洞,他也无法辨别来自网络范围内任何一台机器的ARP数据包的真伪。所以,对付此类违法犯罪活动,传统上从操作系统或交换设备的单点防御已无济于事。防止ARP攻击,需要从网络整体结构上加强对MAC地址的综合管理防止各机器ARP表混乱,并通过网络范围内ARP广播包分析以快速检测到攻击源位置。全国目前有越来越多的正规合法网吧和社区信息苑。ARP攻击对这些互联网公众上网环境的安全产生巨大威胁,攻击事件呈不断上升趋势,造成不良信息传播、信息窃取等违法行为对国家的安定团结社会的稳步发展有极为不利的影响。互联网信息安全管理工作面临着巨大挑战,深入研究以ARP为基础
5、的网页重定向、路由伪造的防范技术,加强对全国公众上网地点与公用托管机房的网络安全监管已经势在必行。通过对ARP攻击原理的剖析,并针对实际公众上网环境的特征,通过从规划、结构、系统三方面入手采取整体防范手段,形成以较小的成本在公众上网环境中有效抑制ARP攻击蔓延的解决方案。本文通过现象分析逐步推测出ARP的攻击原理。随后通过对ARP数据帧格式的解析,证明了ARP协议漏洞是可以被用作ARP欺骗。根据上述原理,尝试使用Socket编程实现了ARP欺骗数据包的构造和发送、MAN-IN-MIDDLE数据包侦听转发、DOS拒绝服务攻击等手段。在探讨ARP攻击的防御措施时,文章从MAC地址集中管理、ARP数
6、据包探测以及系统安全加固三方面进行论述。对于公众上网环境中存在可被ARP攻击的漏洞进行分析,并对整体防御构架进一步探索。关键词 ARP攻击/ARP协议/安全防护ARP Virus Attacks And PreventionABSTRACTARP attacks is a network attack method that using the basic principles of ARP protocol flaws to publish ARP broadcast frames through a terminal server or a deceive in the local net
7、work region. attackers can use ARP attack to distort the information of normal pages which users visit, embed alicious code, publish adverse information, steal user account, sniff the data on the network, and other illegal activities.In the past, ARP spoofing principle is often applied to a simple d
8、enial of service attack. However, Internet cafes and other public Internet access envi environment is often lack of management and have massive flows of the larger users group, so there are more ARP interception and deception, it combined with distortion of Web technology and other attacks. The reas
9、on of why this ARP attack was so easily access various public facilities is that in the external environment or the public Internet services or the IDC care room,there are thousands machines the same network segment, and there are often peoples come from different units or different groups use the v
10、arious terminals and servers. The complex ownership of various systems and the mobility of the staff and users result in more security loopholes and large blind spots in the network environmental management. Thus a new eneration of ARP spoofing based attacks which can redirect website and embed viru
11、s to html pages was breeding.Moreover, the ARP attack might cause greater damage than the usually attack. Generally, the IP address conflict can be avoided through a variety of ways, but the ARP work is in a low-rise and concealed higher. Not like the ARP address conflict, the system will not judge
12、the correctness of the ARP cache and suggest that. Many hacking tools can send ARP spoofing and ARP packets recover data packets at any time. That means in the public cess environment, hackers can sending ARP packet approach with any authority inthe computer terminal to the take control of any netwo
13、rk computer, etwork server or networking equipment, they can also sniff data communications, or make data packets to include virus code or unhealthy information. Hackers can also maximize the use of ARP spoofing by combine it with other attack methods, such as interception, denial of service, mount
14、virus. So it can chieve a variety of offensive purposes, such as the theft of information, thespread of the virus, network routing destruction, violence advertisements etc.From the point of view of ARP attack prevention, ARP attack revention is more difficult than the general precautions to prevent
15、network security. Because of the defect of ARP broadcasting agreement itself, even an Internet site or system administrator can ensure their servers and network switching equipment without flaws; the system is unable to distinguish the authenticity of a ARP packets from any machine within a network.
16、 So, to against such criminal activities, the traditional switching equipment from the operating system or the single-point defense has been useless. Preventing ARP attacksfrom the network we needs to strengthen overall structure of the MAC address of the integrated management of the machines to pre
17、vent confusion ARP table, and analysis the ARP broadcast network packet to detect fast attack source location.National currently has many regular legitimate Internet cafes and community information Court. ARP attacks on the public Internet access have a tremendous environmental security threats, the
18、 attack was the rising trend of adverse information dissemination, information theft and violationsof the countrys social stability and unity steady development of extremelyadverse impact. Internet information security management is faced with a great challenge, in-depth study based on the ARP websi
19、te redirects, routing counterfeit prevention technologies, strengthening of the citys thousands of Internet sites and public utility care network security monitoring room hasbeen inevitable. Through the analysis of the ARP Attack, and aim at the Public Internet environment of Shanghai, we can create
20、 a ARP attack defending solutions through adjust the network structure, planning, and system configuration. That way as a whole solution can prevent ARP attacks spreading in public internet environment effectively with a smaller cost.This paper demonstrates whole process of an ARP attack first, and
21、then gradually speculation the attacks principle through the phenomenon. Usingthe analysis of ARP data frame format proved that ARP loopholes can beused to ARP spoofing. According to this principle, we try to use the Socketprotocol Programming ARP spoofing packet structure, data transmission,MAN-IN-
22、MIDDLE data packets interception, and denial of service attacks. On discussing the defensive measures of ARP attack, the article depictionfrom the MAC address management, ARP packet sniff, and system securityreinforcement. Finally, through the actual experience of the Network security reinforcement
23、projects of Oriental Digital Community Court , weanalysis the ARP attack vulnerability on the large-scale public Internet environment, and discuss the overall defense framework for further exploration.KEY WORDS ARP Attack, ARP Protocol, Network Safety目 录第1章绪论11.1引言11.2研究背景及意义21.3本文研究内容和组织结构3第2章 ARP攻
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 毕业设计 论文 ARP 病毒 攻击 防范
链接地址:https://www.31ppt.com/p-3976259.html