Font Size: a A A

A Approach And Realization Of Router Attack Technology Based On Vulnerability Attacking Theory

Posted on:2013-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y W TangFull Text:PDF
GTID:2248330395974318Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the key equipments connecting networks, router is the vital pointwhich links internal and external networks. Thousands of routers is themain elements of internet. The reliability and security directly relate to thecapability and security of communication information. Survey on securityand prevention technology of router is the core issue of network security,meanwhile, the research is great significant for network securitypenetration testing and improving the router’s capability of anti-attackand robustness.The thesis mainly researches on router attack techniques from twoaspects which is vulnerabilities of software security and running protocols.According to comparing with the differences of attack techniques ontrandional host and router, the thesis research on the special techniques ofrouter attack, providing the basis inspection standards for key networkequipments, which is representative and significant.In this thesis, we made an in-depth comparative study on attack techniques of computer and router. The router system vulnerabilities areclassified as three types, which are hardware and software flaws, runningprotocols flaws and configuration flaws, making a direction for thefollow-up research. The project indicates the particularity of router attacktechnology which are divided into six categories. In this thesis, we made adeeply research, sorting out the principle, purpose and hazards of attacktecniques.In this papaer, we carried out three vulnerability-based router attacktechniques in experimental environment, confirming the theoretical andpractical feasibility of the main attack techniques, meanwhile, providingthe flaws for software and hardware platforms, configurating andmanagement process and running services and protocols, which needsmaking better for network management.
Keywords/Search Tags:Router, Cisco IOS, Attack technique, Exploit
PDF Full Text Request
Related items