基于 Opensource 网络安全实验模拟
目录
教务处印制.........................................................................................................................................1
摘 要....................................................................................................................................................5
Abstract................................................................................................................................................6
In this article, the author's main contribution is:.................................................................................6
1. Introduce the basic principle and working process of buffer overflow attack and defense, ARP
attack and defense, based on certified intrusion attacks.....................................................................6
2. OpenSource technology is introduced in network security technology characteristics and
significance..........................................................................................................................................7
3. The design of a buffer overflow attack, ARP attack and defense, based on certified intrusion of
the simulation process.........................................................................................................................7
KEYWORDS : Opensource, Buffer overflow, Arp attack and defence, Based on certified
intrusion ,Network safety....................................................................................................................7
第一章 绪 论.......................................................................................................................................7
在信息化社会中,计算机网络已经日渐深入到日常生活和工作当中,成为各行业办公、业
务开展、通信的基础设施。以网络方式获得信息和交流信息已成为现代信息社会的一个重
要特征, 然而伴随着网络信息产业发展而产生的互联网和网络信息的安全问题,也已成为热
点问题。各种网络系统以及有关软件硬件系统的缺陷、各种系统管理方面的漏洞,带来了
许多安全上的隐患,出现了许多严重的网络安全问题。因此网络安全技术也成为社会中非
常迫切的要求。.................................................................................................................................7
1.1 网络安全的简介...........................................................................................................................8
1.1.1 计算机网络安全的概念............................................................................................................8
1.1.2 计算机网络安全的现状............................................................................................................8
1.2 研究的背景和意义.......................................................................................................................8
1.2.1 研究背景....................................................................................................................................8
随着因特网发展和 IT 的普及,计算机网络已经日渐深入到日常生活和工作当中。互联的信
息多了随之而来产生了一系列的网络安全问题。在计算机网络日益扩展和普及的今天,对
计算机安全的要求更高,涉及面更广。不但要求防治病毒,木马的侵害。还要提高系统抵
抗外来非法入侵,提高在局域网内被网络限制和欺骗的防范能力。提高对数据传输和信息
的保密性,避免在传输途中遭受非法窃取。.................................................................................8
1.2.2 研究意义....................................................................................................................................9
1.3 研究的目的和内容.......................................................................................................................9
第二章 关键技术..............................................................................................................................10
2.1 opensource 技术..........................................................................................................................10
2.1.1 opensource 的定义...................................................................................................................10
2.2.1 opensource 的发展和特征.......................................................................................................10
2.2 TCP/IP 协议................................................................................................................................11
2.2.1 TCP/IP 协议的基本概念.........................................................................................................11
2.2.2 TCP/IP 协议的基本原理.........................................................................................................11
2.2.3 TCP/IP 协议特点.....................................................................................................................13
2.3 环境调试.....................................................................................................................................13
第三章 设计分析..............................................................................................................................15
3.1 总体分析.....................................................................................................................................15
3.1.1 网络安全模拟实验流程 ......................................................................................................15
3.2 实验设计分析.............................................................................................................................16
第 3 页