端口掃描與檢測技術的實現
包括目錄名稱:
端口掃描與檢測技術的實現 - 2 文件數, 0 目錄數.
..\端口掃描與檢測技術的實現.doc
..\端口掃描與檢測技術的實現.rar
論文提交日期:
XXXX年06月10日
端口掃描與檢測技術的實現
摘 要
隨著Internet日益廣泛的應用,黑客攻擊行為也是有增無減。如何有效地抵御這種攻擊行為,一直是信息安全領域的焦點。
而其中,端口掃描技術吸引了越來越多人的關注。端口掃描是黑客搜集目標主機信息的一種常用方法。為了有效地對付網絡入侵行為,對端口掃描進行研究是非常有益和必要的。攻擊者在攻擊一個目標時,首先要獲取目標的一些基本信息,端口掃描就是其中最簡單最重要的方法之一,它可以掃描目標機器中開放的端口,從而確定目標機器中提供的服務,為下一步攻擊做準備。針對端口掃描技術,相應的端口掃描檢測技術顯的越發重要,作為網絡安全技術中的一個重要課題,端口掃描檢測技術意義重大。
本文首先闡述了端口掃描技術以及端口掃描檢測技術的基本原理和常用方法,然后在此基礎上設計了一個對基于網絡的端口進行掃描,能判斷出目標主機端口開放情況的程序以及一個從網絡信息的數據包的捕獲和分析著手,再通過統計判斷是否存在端口掃描行為的程序,最后從攻擊和防御的角度對端口掃描和檢測技術作了演示及分析。
關鍵詞:端口;端口掃描;數據包捕獲;端口檢測
The Realization of Port Scanning and Detecting Technology
Abstract
As the widely applying of Internet, the attacking behavior made by hacker is increasing but not decreasing. How to resist this kind of attacking behavior is always the key point of the domain of the information security.
And the port scanning draws people's attention more and more. Port scanning is a usual method which is used by the hacker to collect the information of the target main processor. In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning. When an attacker attacks to a target, he or she will firstly gets some basic information about the target, and the port scanning is one of the most simple and important methods which can scan the opening Port of the target machine to make sure the offering service made by the target machine, and it is a preparation to the next attacking. The port detecting seems more and more important referring to the port scanning. As an important task of the secure technique of Internet, the port detecting is of great significance.
In this thesis, it firstly elaborates the basic principles and usual methods of the port scanning. On this basis, it then designs a program which can scan the Port of the Internet, and assess the opening situation of the target main processor, and the other program which begins on capturing and analyzing the information packet of Internet, and then assess whether there is a behavior about port scanning through statistic analyses. Lastly, it demonstrates and analyses the technology of port scanning and port detecting from the viewpoint of attacking and resisting.
Key Words:port; port scanning; packet capture; port detecting
目 錄
論文總頁數:23頁
1 引言 1
1.1 本課題研究的意義 1
1.2 本課題的研究方法 2
2 端口掃描概述 2
2.1 基本概
上一篇:
端口信息工具
下一篇:
創新人才培養及其能力提高的研究與實踐