Please wait a minute...
工程设计学报  2011, Vol. 18 Issue (1): 58-61    
工程设计理论、方法与技术     
一种改进的分段标识扫描系统的研究
 杨 玲1, 程 勇2, 孙晓聪3
1.南京信息工程大学 滨江学院, 江苏 南京 210044; 2.南京信息工程大学 江苏省气象传感网技术工程中心, 江苏 南京 210044; 3.武汉大学 计算机学院, 湖北 武汉 430072
Research on an improved section identification scanning system
 YANG  Ling1, CHENG  Yong2, SUN  Xiao-Cong3
1.Binjiang College, Nanjing University of Information Science and Technology, Nanjing210044, China;
2.Jiangsu Technology and Engineering Center for Meteorological Sensor Network, 
Nanjing University of Information Science and Technology, Nanjing 210044, China;
3. Computer School, Wuhan University, Wuhan 430072, China
 全文: PDF(2718 KB)   HTML
摘要: 由于网络的异构性,防火墙和入侵检测系统的监测,扫描过程中往往遇到不期望的阻碍.为了能更好把握主机和网络的安全状况,需要对网络扫描系统的隐蔽性进行研究.设计了具有一定隐蔽性的网络扫描系统,实现了多种当前流行的网络扫描技术,通过优化扫描端口、减慢扫描速度、伪造垃圾数据包等手段增强扫描的隐蔽性;并对IPID扫描技术进行了改进,提出了一种名为随机分块二分法的改进算法,提高了普通IPID扫描的效率.
关键词: 网络扫描端口扫描操作系统扫描隐蔽性网络扫描IPID扫描    
Abstract: Due to the heterogeneity of network and firewall, IDS
monitoring, network scanning often encounter unexpected obstacles. In order to have the
situation of network security well in hand, we need to research the convert network
scanning techniques. This paper designed a covert network scanning system which used lots
of popular network scanning technologies and made scanning even more secret by optimizing
the scanning ports, slowing down the scanning and forging data packets. This thesis
presented an improvement of the IPID scanning technique which named random chunk binary
algorithm and improved the efficiency of the ordinary.
Key words: network scanning    port scanning    OS scanning    covert network scanning    IPID scanning
出版日期: 2011-02-28
CLC:  TN 911.72  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
杨玲
程勇
孙晓聪

引用本文:

杨 玲, 程 勇, 孙晓聪. 一种改进的分段标识扫描系统的研究[J]. 工程设计学报, 2011, 18(1): 58-61.

YANG Ling, CHENG Yong, SUN Xiao-Cong. Research on an improved section identification scanning system. Chinese Journal of Engineering Design, 2011, 18(1): 58-61.

链接本文:

https://www.zjujournals.com/gcsjxb/CN/        https://www.zjujournals.com/gcsjxb/CN/Y2011/V18/I1/58

[1]DE VIVO Marco, CARRASCO Eddy, ISERN Germinal, et al. A review of port scanning techniques[J]. Computer Communications Review, 1999, 29(2): 41-48. 

[2]刘咏. 网络安全性能测试平台之端口扫描研究及实现[D]. 成都:四川大学, 2004.

LIU Yong. The network security tests of platform system port scan agent of study and realizing [D]. Chengdu: Sichuan University, 2004.

[3]蒋卫华, 李伟华, 杜君. 网络扫描隐蔽性分析[J]. 计算机应用研究,2003,20(12):93-95.

JIANG Wei-hua, LI Wei-hua, DU Jun. On the concealment of network scanning [J].Application Research of Computers, 2003, 20(12):93-95.

[4]陈璟, 戴祖峰. 一种新的端口扫描技术——Idle扫描[J]. 信息安全与通信保密,2004,12(2):38-40.

CHEN Jing, DAI Zu-feng. A new port scanning technology—Idle scanning [J]. ChinaInformation Security, 2004,12(2):38-40.
No related articles found!