论文部分内容阅读
本文从IP欺骗中的被假冒的信任主机和目标主机两个方向讲述了IP欺骗的实现,围绕TCP/IP握手机制产生的状态转换体现其内在缺陷,并介绍了相关的防御策略。
This paper describes the implementation of IP spoofing from two aspects: spoofing trusted host and target host in IP spoofing. The state transition around TCP / IP handshake mechanism embodies its inherent defects and introduces the related defense strategies.