共查询到18条相似文献,搜索用时 78 毫秒
1.
通过对ARP病毒的欺骗攻击原理进行分析,提出防御图书馆局域网内部攻击的解决方案,彻底解决图书馆网络遭受ARP病毒的欺骗攻击。 相似文献
2.
通过对ARP病毒的欺骗攻击原理进行分析,提出防御图书馆局域网内部攻击的解决方案,彻底解决图书馆网络遭受ARP病毒的欺骗攻击。 相似文献
3.
本文介绍了ARP原理,ARP欺骗过程,ARP的常见几种攻击分类,通过终端用户防护和DHCP监控的方法,对ARP攻击的防范策略。 相似文献
4.
随着计算机技术、计算机网络的迅猛发展和日益普及.越来越多的部门、单位、校园组建了自己的局域网,但随之而来的局域网内病毒的爆发对网络的正常使用和数据安全造成了严重威胁,特别是局域网内的ARP欺骗攻击对网络的正常运行造成很大的威胁。本文介绍了校园网内ARP欺骗攻击的一些防范方式,希望对类似防范工作有一定借鉴。 相似文献
5.
通过对校园机房病毒及ARP欺骗特点的分析,提出对机房病毒及ARP欺骗实行整体防护的思路,并且阐述了该思路的具体实施方案,以及该方案的原理。 相似文献
6.
随着计算机网络的迅猛发展,网络攻击的多样化、频繁化也日益显著,尤其是针对ARP协议的攻击,以对计算机网络安全造成巨大的威胁。本文从ARP协议的原理入手,分析网络中同一网段的主机、网关是如何遭受ARP欺骗的,以及如何防御ARP欺骗。 相似文献
7.
近期利用ARP协议欺骗攻击网络的病毒在校园网中大肆传播.导致网络运行极不稳定甚至造成校园网中部分区域的网络瘫痪,这极大地影响了校园网用户的正常上网。本文首先介绍了AKP攻击原理,然后分析了AKP攻击的实现过程,最后根据我校网络现状提出并实施了一系列的解决方案。 相似文献
8.
目前,图书馆网络技术应用日益广泛,在带来方便的同时,在局域网内也可能会产生ARP攻击,造成网络瘫痪。本文从介绍ARP网络协议入手,通过对基于ARP欺骗的网络攻击方式进行分析,提出了检测和防御网络内部攻击的多项措施。 相似文献
9.
10.
随着计算机技术的普及,越来越多的高校建设计算机机房用于师生进行学习,机房已经成为高校教学活动的重要场所,但在日常使用中,ARP病毒攻击已经成为影响机房正常运转的头号"杀手",本文从ARP病毒运行的原理出发,探索出机房等局域网中预防ARP病毒攻击的措施,具有一定的现实意义。 相似文献
11.
机构知识库与科研管理信息化环境集成的尝试 总被引:2,自引:0,他引:2
对基于DSpace建设的机构知识库与中国科学院资源规划(ARP)集成的尝试进行介绍,包括一个ARP中不同类型科研产出数据导出工具的开发,一个基于B/S架构的Excel数据导入DSpace工具的开发,并分析如何针对不同类型的科研产出数据定制DSpace元数据输入和显示界面。 相似文献
12.
Jianxia Ma Yuanming Wang Zhongming Zhu Runhuan Tang 《Library Collections, Acquisitions, and Technical Services》2009,33(1):1-7
In the present paper an attempt of data exchange between the institutional repository based on DSpace and the Academy Resource Planning System (ARP) of Chinese Academy of Sciences (CAS), which is the information environment for management of scientific research in CAS, was described. It includes the development of a tool based on browser which imports data from EXCEL into DSpace and a tool which exports data from DSpace into EXCEL. Consequently, data can be exchanged between ARP and DSpace through EXCEL. In addition, the way to customize the input form and the display page according to different types of documents was introduced. 相似文献
13.
14.
《Journal of Radio & Audio Media》2013,20(2):173-205
This article examines the persuasive attacks made against Rush Limbaugh after his insults of Georgetown Law student Sandra Fluke. The persuasive attacks against Limbaugh attempted to increase perceptions of his responsibility for the acts, but the majority worked to increase the perceived offensiveness of his acts. The most successful attacks extended Limbaugh's attacks to the audience, pointed out Limbaugh's own inconsistencies, applied pejorative labels to Limbaugh's words, and linked Limbaugh to the positions and ideologies of the Republican Party. The analysis found that the attacks were successful in the short-run, but less so in the long-term. 相似文献
15.
论述采用基于QinQ业务数据分流的多校区图书馆组网模式,为不同的数据流嵌套不同的内外层VLAN标签,不仅能够实现各分馆间VPN专网互联的需求,同时还能够根据不同应用对各种业务进行数据分流和精细化管理,有效解决长期以来存在的安全访问控制难、业务保障区分难以及ARP病毒泛滥、IP地址冲突等诸多难题,进一步提高多校区图书馆的网上服务质量。 相似文献
16.
Dawn Pike 《New Review of Academic Librarianship》2017,23(2-3):245-257
ABSTRACTThis article discusses how RADAR, the institutional repository (IR) at the Glasgow School of Art (GSA), has been modified to house an Annual Research Planning (ARP) template. A case study on the implementation of this research planning tool will outline the role that a repository and its staff can play in supporting individuals, enhancing processes, and helping to reach strategic institutional goals in preparing for the next Research Excellence Framework (REF). The paper will also investigate how the extension of RADAR to incorporate Current Research Information System (CRIS) elements has led to increased user engagement and has successfully demonstrated a new use for the repository beyond its scholarly communication function. 相似文献
17.
《Government Information Quarterly》2018,35(1):151-160
Cities are becoming smarter and smarter. While the rapid progress in smart city technologies is changing cities and the lifestyle of the people, it creates also huge attack surfaces for potential cyber attacks. The potential vulnerabilities of smart city products and imminent attacks on smart city infrastructure and services will have significant consequences that can cause substantial economic and noneconomic losses, even chaos, to the cities and the people. In this paper we study alternative economic solutions ranging from incentive mechanisms to market-based solutions to motivate governments, smart product vendors, and vulnerability researchers and finders to improve the cybersecurity of smart cities and e-government. These solutions can be integrated into policy instruments in defending smart cities and e-governments against cyber attacks. 相似文献
18.
The federal government's war on terrorism has heightened understanding and appreciation of the many facets of electronic government. Electronic government is used as a resource in the war on terrorism, helping to prevent and prepare for attacks. It might also prove useful in recovering from attacks. Unfortunately, e-government itself is a likely target for terrorists. Cyber intrusions into government Web sites and damage to, or destruction of, infrastructure, whether a computer system or an electrical grid that supplies power, could impair e-government. E-government is also attractive as a potential target for the information it provides, information that enemies of the United States could use in identifying weaknesses and planning attacks. While the Bush Administration has developed a comprehensive policy, based on a market model, for facilitating the use and effectiveness of e-government, its approach to e-government security, particularly in the area of Web content, has been ad hoc. Soon after the September 11, 2001, attacks, federal agencies began scrubbing their Web sites, an effort that has implications for the notion, and practice, of having a well-informed citizenry. 相似文献