资源描述:
《针对黑客网络攻击的防范措施分析(analysis of countermeasures against hacker attacks)》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、针对黑客网络攻击的防范措施分析(Analysisofcountermeasuresagainsthackerattacks)Analysisofcountermeasuresagainsthackerattacks:XiaYang,LuYuliang(Teachingandresearchsectionofnetworkengineering,ElectronicEngineeringInstitute,Anhui,Hefei230037)Thefirstdescribesthesafetyproblemsexistingincomputernetwork,andthenanalyzethe
2、generalprocessofhackerattacks,thenetworkattackpreventionmeasuresandonthebasisofdiscussionandanalysis.KeywordsTCP/IPnetwork;security;networkattack;The,analysis,of,network,defense,precautions,on,Hacker,based,s,network-attackingXIA,Yang,LU,Yu-liang(Staff,room,of,Network,Engineering,Electronic,Engineer
3、ing,Institute,Hefei,Anhui,,China)AbstractAtfirst,thispapersummarizesthesecurityproblemsexistincomputernetwork.Thenacommonprocedureforhackstoattacknetworkisgiven.Finally,itelaboratessomemethodsandprecautionsofnetworkattackbasedonwhathavebeenposedabove.Key,words,TCP/IP,security,of,network,attack,of,n
4、etwork0IntroductionWiththedevelopmentofcomputernetwork,theopenness,sharingandinterconnectionofnetworkhavebeenexpanded.Especially,thepopularityofInternetmakestherapiddevelopmentofsomenewnetworkservicessuchascommercialdigitalcurrency,Internetbankingandsoon,andthenetworksecurityproblemisbecomingmorean
5、dmoreimportant.Atpresent,themainfactorscausingnetworkinsecurityareflawsinthedesignofprotocols,systemsanddatabases.TCP/IPprotocolisgenerallyusedinnetworkinterconnection.Itisanindustrystandardprotocolcluster,buttheprotocolclusterhasnotconsideredtoomanysecurityproblemsatthebeginningofitsformulation,an
6、dtherearemanysecurityholesintheprotocol.Fortheoperatingsystem,becausethecomputernetworkoperatingsystemcurrentlyusedinstructuraldesignandcodedesignemphasisonconsideringtheconvenienceofthesystem,thesystemsecurityvulnerabilitiesexistinmanyaspectsofremoteaccess,accesscontrolandpasswordmanagementandetc.
7、.Similarly,thedatabasemanagementsystem(DBMS)therearemanyaspectsofaccessmanagement,datasecurityandremoteaccess,itcanengageininformationcollectingandsabotagingtheprograminDBMSorintheapplicationprocedure.Itcan