【正文】
ngflood、pong、echok、flushot、fraggle和bloop是常用的ICMP攻擊工具。針對的網(wǎng)絡(luò)連接的IP設(shè)備,因為它使用了合法的ICMP消息。如圖43所示:圖43本地安全設(shè)置(4) 在“管理篩選操作”中,取消選中“使用添加向?qū)А保瑔螕簟疤砑印卑粹o,在“常規(guī)”頁中輸入名稱為“Deny操作”,在“安全措施”頁中設(shè)置為“阻止”。為了不斷增強信息的全安防御能力,以用不斷深核及網(wǎng)絡(luò)協(xié)議的實現(xiàn),并熟知針對各種攻擊手段的預(yù)防措施,只有這樣才能盡最大可能保證網(wǎng)絡(luò)的安全。最后,感謝所有在這次畢業(yè)設(shè)計中給予過我?guī)椭娜?。通過網(wǎng)絡(luò)攻擊手段,可以直接攻擊大量的聯(lián)網(wǎng)機器,所以我們對黑客的攻擊必須加以重視和防范。然后分別在“TCP端口、UDP端口和IP協(xié)議”的添加框上,點擊“只允許”,后按添加按鈕,然后在跳出的對話框中輸入端口,通常我們用來上網(wǎng)的端口是:80、8080,而郵件服務(wù)器的端口是:2110,F(xiàn)TP的端口是21,同樣將UDP端口和IP協(xié)議相關(guān)進行添加。使用適當(dāng)?shù)穆酚蛇^濾則可以部分防止此類攻擊,如果完全防止這種攻擊,就需要使用基于狀態(tài)檢測的防火墻。服務(wù)拒絕攻擊是最容易實施的攻擊行為。① 向目標(biāo)主機發(fā)送一個只有IP頭的IP數(shù)據(jù)包,目標(biāo)將返回Destination Unreachable的ICMP錯誤報文。一臺主機向一個節(jié)點發(fā)送一個Type=8的ICMP報文,TCP協(xié)議需要的ICMP消息做出響應(yīng),如果途中沒有異常(如果路由器丟棄、目標(biāo)不回應(yīng)ICMP或傳輸失?。瑒t目標(biāo)返回Type=0的ICMP報文,說明這臺主機存在。此外,報告差錯的ICMP報文還總是包括產(chǎn)生問題的數(shù)據(jù)報首部用其開頭的8個字節(jié)的數(shù)據(jù)。ICMP報文的最終目標(biāo)不是應(yīng)用程序或目的用戶,而是該機上處理它的Internet協(xié)議軟件模塊。因此為了提高IP數(shù)據(jù)報交付成功的機會,反映數(shù)據(jù)報的投遞情況,因特網(wǎng)增加了因特序等情況,因此為了提高IP數(shù)據(jù)報交付成功的機會,反映數(shù)據(jù)報的投遞情況,因特網(wǎng)增加了因特網(wǎng)控制報文協(xié)議(ICMP),來向源發(fā)主機告知網(wǎng)絡(luò)環(huán)境中出現(xiàn)的問題。這些控制消息雖然并不傳輸用戶數(shù)據(jù),但是對于用戶數(shù)據(jù)的傳遞起著重要的作用。(3) 當(dāng)更換計算機時要更新靜態(tài)的ARP映射表。為了讓路由器重啟后這些綁定條目仍然有效,可以選擇“全部導(dǎo)入”把這些條目存入靜態(tài)ARP表,打開“ARP綁定”設(shè)置,可以看到一個靜態(tài)的ARP映射表已經(jīng)建立。進行ARP綁定前首先要確定網(wǎng)絡(luò)是正常運行的,然后再ARP綁定。(6) 使用硬件屏蔽主機。由于ARP欺騙的木馬程序發(fā)作的時候會發(fā)出大量的數(shù)據(jù)包導(dǎo)致局域網(wǎng)通訊擁塞以及其自身處理能力的限制,用戶會感覺上網(wǎng)速度越來越慢。打開D的IP轉(zhuǎn)發(fā)功能,A發(fā)送過來的數(shù)據(jù)包,轉(zhuǎn)發(fā)給C,好比一個路由器一樣。從上面可以看出,ARP協(xié)議的基礎(chǔ)是信任局域網(wǎng)內(nèi)部所有的人,那么就很容易實現(xiàn)在以太網(wǎng)上的ARP欺騙。但這個目標(biāo)MAC地址是如何獲得的呢?它就是通過地址解析協(xié)議獲得的。AbstractThe ARP deceit and the ICMP attack are in the ethernet the monly used attack method, both all may carry on DOS to the goal network (to refuse to serve) the band width obtain through the analysis guard to the measure aspect similarities and differences implements the ARP deceit to be easier to achieve the band width attack the conclusion.Refuses to serve (DenialofService, Dos) attack, refers uses the TCP/IP agreement the flaw attack goal main engine or the network, causes it to be unable to provide the normal service or the resources visit, its primary purpose is causes to suffer injury the main engine or the network is unable to receive promptly and processes the outside to request, or is unable and the response outside DOS attack mainly divides into the network the band width attack and the connective band width attack refers by the enormous munication load impact network, causes the network resources all to consume the danger, finally causes the legitimate user to request is unable to pass. The connective attack refers with the massive connection request flushes the puter, causes the available operating system resources all to consume the danger, finally causes the puter to be unable to process the validated user the deceit and ICMP attack implementation me