Font Size: a A A

Research And Realization Of Attacks On Backbone Network Routers

Posted on:2008-12-31Degree:MasterType:Thesis
Country:ChinaCandidate:X H JiangFull Text:PDF
GTID:2178360212974159Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of Internet, the network security becomes more and more important. Backbone network is the foundation of Internet. Attacking Backbone router, the core equipment of backbone network, can affect the capability of the network, even make it breakdown.Network attack technology is relative to security closely. We can constitute good security strategy after we master the principle, process and harm of attack.The content of this thesis is an important part of"Research of Security Verifying Methods for Backbone Routers and Switches", which is one of the National 242 Information Security Projects. The thesis is organized as follows. First, it analyzes the status quo and threat of Internet and backbone network, the aim and significance of researching attacks. It also analyzes the status quo and developing direction of this research. According to the analysis of the backbone router's status quo, architecture, software system and security and the attack technology classification standard, this thesis puts forward a new method to classify the attack technology, which fits for backbone routers, and then it researches the principle, process and harm of every class of attacks. Finally, it designs, implements and tests two methods used for attacking, which named traffic flooding attacks and RIP spoofing respectively. The work of this thesis provides gist for constituting the security strategy and testing standard.
Keywords/Search Tags:Backbone Router, Attacking-method, Traffic Flooding Attack, Routing Information Protocol (RIP) Spoofing
PDF Full Text Request
Related items