【正文】
接入交換機通過監(jiān)控用戶的正常動態(tài) IP 地址獲取過程,獲取正常用戶的IPMAC 對應關系在接入交換機上綁定。3 解決方案介紹根據 ARP 的攻擊原理,我們可以很容易發(fā)現當前 ARP 攻擊防御的關鍵所在:如何獲取到合法用戶和網關的 IPMAC 對應關系,并如何利用該對應關系對 ARP 報文進行檢查,過濾掉非法 ARP 報文。這種攻擊在校園網中也有發(fā)生,但概率和“網關仿冒”攻擊類型相比,相對較少。AbstractAlong with the telematics speediness development,the Inter is degreesing to world,so people crescentingby the ,people munication with others by puterat large,the table is more and more in Inter,the peoplethat using hole to make unlawfuk advantages being more andmore,and the wises about the attack are much attack is the familiar fashion in Hacker how to keep away the ARP attack has enormous value.關鍵字:ARP;ARP 防護;ARP 攻擊;網絡安全目 錄1 背景介紹 .....................................................................................................3 網管仿冒 .............................................................................................................3 欺騙網關 .............................................................................................................3 欺騙終端用戶 .....................................................................................................4 ARP 泛洪攻擊 .....................................................................................................52 ARP 攻擊的原理及其泛濫原因 ....................................................................63 解決方案介紹 ..............................................................................................7 認證模式 .............................................................................................................7 總體思路 ......................................................................................................7 認證模式之終端防護 ..................................................................................7 認證模式之接入綁定 ..................................................................................9 DHCP 監(jiān)控模式 ................................................................................................10 總體思路 ....................................................................................................10 相關技術 ....................................................................................................10 ARP 入侵檢測機制 ................................................................................10 其他技術 ...........................................................................................................13 基于網關 IP/MAC 的 ARP 報文過濾功能 ........................................