论文部分内容阅读
局域网内ARP攻击极为泛滥,其利用ARP协议设计上存在的漏洞,通过发送伪造ARP应答包给目标主机,来实现ARP攻击,可造成通信内容的泄露或网络访问的受限等。本文以“因特网接入失效”和“中间人攻击”两种形式,分别在给定的网络结构中,介绍和分析了ARP攻击的实施原理,并自主构建协议数据,给出了ARP攻击的协议字段信息,为初学者提供了实践指导。为有效防范ARP攻击,给出了PC机与网络核心设备上,各自应当采取的常用防范措施,可为企业及校园网等的安全管理提供参考与帮助。
ARP attacks in local area networks are extremely flooding. They exploit the vulnerabilities in ARP protocol design and implement ARP attacks by sending fake ARP reply packets to target hosts, which can result in the leakage of communication content or limited network access. This paper introduces and analyzes the implementation principles of ARP attacks in a given network structure in the form of “Internet access failure” and “man-in-the-middle attack” respectively and constructs the protocol data autonomously. Attack protocol field information for beginners to provide practical guidance. In order to effectively prevent ARP attacks, the common precautions that should be taken on the PC and network core devices are given, which can provide reference and help for the security management of enterprises and campus networks.