计算机应用 ›› 2005, Vol. 25 ›› Issue (04): 870-873.DOI: 10.3724/SP.J.1087.2005.0870

• 人工智能与仿真 • 上一篇    下一篇

IPID隐蔽网络扫描的原理与实现

赵秋,胡华平,余海燕   

  1. 国防科学技术大学计算机学院
  • 发布日期:2005-04-01 出版日期:2005-04-01

Theory and implementation of IPID covert network scanning

ZHAO Qiu,HU Hua-ping,YU Hai-yan   

  1. School of Computer Science,National University of Defense Technology
  • Online:2005-04-01 Published:2005-04-01

摘要: 介绍了IPID(IPIdentification)隐蔽网络扫描原理,并在Windows操作系统下,设计和实 现IPID隐蔽网络扫描系统原型;为了提高网络扫描效率,提出了“分块二分算法”,并对其进行了性能 分析与比较。研究结果表明,“分块二分算法”是适合IPID隐蔽网络扫描的,而是否合理设置两次取 IPID序列号之间等待的基本延时,将决定IPID隐蔽网络扫描的正确性和扫描速度。

关键词: 网络扫描, IPID隐蔽网络扫描, 原始套接字, 网络嗅探, 二分算法, 分块二分算法

Abstract: The theory of IPID(IP Identification) covert network scanning was introduced,then the design and implementation of IPID covert network scanning under the operation Windows was proposed.In order to improve the efficiency of scanning, the chunk binary algorithm was introduced, then its performance was analyzed and was compared with other algorithm. The results show that the chunk binary algorithm is a good algorithm of IPID covert scanning,and the correctness and speed of IPID covert scanning is decided by setting delay time between getting two IPID.

Key words: network scanning, IPID covert network scanning, socket, sniffer, binary algorithm, chunk binary algorithm

中图分类号: