【正文】
石家莊經(jīng)濟(jì)學(xué)院本科生畢業(yè)論文 I 摘 要 隨著生活節(jié)奏的加快,計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)也在高速 發(fā)展 , Inter 作為已經(jīng)成為我們生活中不可或缺的一部分。 Inter 安全問題也越來越受人們關(guān)注, TCP/IP 作為一個(gè)事實(shí)上的工業(yè)標(biāo)準(zhǔn),是 Inter 使用的標(biāo)準(zhǔn)協(xié)議集,是目前 Inter 網(wǎng)絡(luò)的基礎(chǔ),也是網(wǎng)絡(luò)環(huán)境中廣泛采用的互聯(lián)網(wǎng)協(xié)議。然而 ,這樣重要的一個(gè)協(xié)議族在其制訂之初,沒有考慮安全因素,因此他本身無安全可言。 網(wǎng)絡(luò) 安全問題越來越受到國家和社會(huì)的關(guān)注,網(wǎng)絡(luò)安全已經(jīng)成為計(jì)算機(jī)通信領(lǐng)域的重要研究方向之一。 這篇論文從研究 TCP/IP 協(xié)議的脆弱性入手來研究 TCP/IP 協(xié)議的安全問題,對(duì) TCP/IP的進(jìn)行了 對(duì) TCP/IP 進(jìn)行概述,模型的發(fā)展、如何由 OSI 模型發(fā)展到了 TCP/IP 模型,并對(duì)TCP/IP 模型的優(yōu)點(diǎn)、體系結(jié)構(gòu)、數(shù)據(jù)報(bào)結(jié)構(gòu)進(jìn)行了描述;再對(duì) TCP/IP 進(jìn)行了詳解,對(duì)常見協(xié)議按照使用被使用關(guān)系、所屬公司、等進(jìn)行分類,并對(duì)主要協(xié)議描述 ,并對(duì)各個(gè)層次協(xié)議的脆弱性問題進(jìn)行了比較深入的討論。在前面分析的基礎(chǔ)上畫出 TCP/IP 安全圖 。然后用現(xiàn)在最為流行的 ARPSpoof 工具從實(shí)驗(yàn)的角度上來分析 ARP 協(xié)議的脆弱性,證明 ARP協(xié)議的脆弱性確實(shí)存 在。 關(guān)鍵詞 : TCP / IP 協(xié)議;網(wǎng)絡(luò)安全;脆弱性; TCP/IP 安全圖; ABSTRACT With the development of puter work technology, TCP / IP as a de facto industry standard, is the set of Inter standard protocol used is based on the current Inter work is widely used in the work environment of the Inter protocol. However, a protocol family such an important beginning in the formulation, there is no security in mind, so no security to speak of his own. Network security is increasingly concerned by the state and society, work security has bee an important research field of puter munication directions. This paper from the study TCP / IP protocol to start to study the vulnerability of TCP / IP protocol security problem, TCP / IP, was on the TCP / IP overview, model development, and how the development of the OSI model to the TCP / IP model, and TCP / IP model advantages, architecture, data reported structure described。 then on TCP / IP Detailed conducted on the mon protocol to be used in accordance with relations, the panies, such as the classification of the main protocol description, and the vulnerability of all levels of protocol issues more indepth discussion. Based on the analysis in the previous draw TCP / IP security plans. Then now the most popular tools from the experimental point of view ARPSpoof up analysis of the vulnerability of ARP protocol to prove the vulnerability of ARP protocol does exist. Keywords: TCP / IP protocol。 work security。 vulnerability。 TCP / IP security plans 石家莊經(jīng)濟(jì)學(xué)院本科生畢業(yè)論文 II 目 錄 摘 要 .................................................................................................................... I ABSTRACT............................................................................................................ I 目 錄 .................................................................................................................. II 1 引言 ................................................................................................................... 4 選題的背景、目的和意義 .............................................................................. 4 主要工作 .......................................................................................................... 5 本文的組織與結(jié)構(gòu) .......................................................................................... 5 2 TCP/IP 概述 ........................................................................................................ 6 開放式通信模型簡介 ..................................................................................... 6 開放式 網(wǎng)絡(luò)的發(fā)展 ...................................................................................... 6 OSI 參考模型 ............................................................................................... 7 TCP/IP 參考模型 ............................................................................................. 9 TCP/IP 的優(yōu)點(diǎn) ............................................................................................ 10 TCP/IP 的數(shù)據(jù)報(bào)結(jié)構(gòu) .................................................................................11 TCP/IP 和 INTERNET 結(jié)合 ....................................................................... 12 3 TCP/IP 協(xié)議詳解 .............................................................................................. 12 TCP/IP 協(xié)議 ................................................................................................... 12 解剖 TCP/IP 模型 ......................................................................................... 12 TCP/IP 協(xié)議族模型分層詳細(xì)描述 ................................................................ 13 應(yīng)用層協(xié)議 ................................................................................................ 13 傳輸層協(xié)議 ................................................................................................ 17 網(wǎng)絡(luò)層協(xié)議 ................................................................................................ 17 網(wǎng)絡(luò)接口層協(xié)議 ......................................................................................... 19 4 TCP/IP 協(xié)議脆弱性分析 .................................................................................. 19 TCP/IP 各層協(xié)議的脆弱性分析 .................................................................... 19 應(yīng)用層協(xié)議脆弱性分析 RADIUS 協(xié)議 .................................................... 19 傳輸層協(xié)議脆弱性分析 TCP 協(xié)議 ............................................................ 23 網(wǎng)絡(luò)層協(xié)議脆弱性分析 IP 協(xié)議 ................................................................ 25 網(wǎng)絡(luò)接口層協(xié)議脆弱性分析 ARP 協(xié)議 ................................................... 28 5 實(shí)驗(yàn) ARP 協(xié)議脆弱性驗(yàn)證 ............................................................................ 28 實(shí)驗(yàn)原理 ........................................................................................................ 29 實(shí)驗(yàn)?zāi)康?........................................................................................................ 29 實(shí)驗(yàn)設(shè)備 ........................................................................................................ 29 實(shí)驗(yàn)步驟 ........................................................................................................ 29 實(shí)驗(yàn)結(jié)論 ........................................................................................................ 34 6 結(jié)論 ............................................