首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 78 毫秒
1.
通过对ARP病毒的欺骗攻击原理进行分析,提出防御图书馆局域网内部攻击的解决方案,彻底解决图书馆网络遭受ARP病毒的欺骗攻击。  相似文献   

2.
通过对ARP病毒的欺骗攻击原理进行分析,提出防御图书馆局域网内部攻击的解决方案,彻底解决图书馆网络遭受ARP病毒的欺骗攻击。  相似文献   

3.
本文介绍了ARP原理,ARP欺骗过程,ARP的常见几种攻击分类,通过终端用户防护和DHCP监控的方法,对ARP攻击的防范策略。  相似文献   

4.
随着计算机技术、计算机网络的迅猛发展和日益普及.越来越多的部门、单位、校园组建了自己的局域网,但随之而来的局域网内病毒的爆发对网络的正常使用和数据安全造成了严重威胁,特别是局域网内的ARP欺骗攻击对网络的正常运行造成很大的威胁。本文介绍了校园网内ARP欺骗攻击的一些防范方式,希望对类似防范工作有一定借鉴。  相似文献   

5.
通过对校园机房病毒及ARP欺骗特点的分析,提出对机房病毒及ARP欺骗实行整体防护的思路,并且阐述了该思路的具体实施方案,以及该方案的原理。  相似文献   

6.
杜伟 《信息系统工程》2010,(4):46-46,49
随着计算机网络的迅猛发展,网络攻击的多样化、频繁化也日益显著,尤其是针对ARP协议的攻击,以对计算机网络安全造成巨大的威胁。本文从ARP协议的原理入手,分析网络中同一网段的主机、网关是如何遭受ARP欺骗的,以及如何防御ARP欺骗。  相似文献   

7.
近期利用ARP协议欺骗攻击网络的病毒在校园网中大肆传播.导致网络运行极不稳定甚至造成校园网中部分区域的网络瘫痪,这极大地影响了校园网用户的正常上网。本文首先介绍了AKP攻击原理,然后分析了AKP攻击的实现过程,最后根据我校网络现状提出并实施了一系列的解决方案。  相似文献   

8.
目前,图书馆网络技术应用日益广泛,在带来方便的同时,在局域网内也可能会产生ARP攻击,造成网络瘫痪。本文从介绍ARP网络协议入手,通过对基于ARP欺骗的网络攻击方式进行分析,提出了检测和防御网络内部攻击的多项措施。  相似文献   

9.
曾维 《贵图学刊》2009,(3):47-48
分析了局域网中ARP病毒入侵的原理,提出了预防ARP病毒攻击的措施,以保障局域网用户的正常使用。  相似文献   

10.
随着计算机技术的普及,越来越多的高校建设计算机机房用于师生进行学习,机房已经成为高校教学活动的重要场所,但在日常使用中,ARP病毒攻击已经成为影响机房正常运转的头号"杀手",本文从ARP病毒运行的原理出发,探索出机房等局域网中预防ARP病毒攻击的措施,具有一定的现实意义。  相似文献   

11.
机构知识库与科研管理信息化环境集成的尝试   总被引:2,自引:0,他引:2  
 对基于DSpace建设的机构知识库与中国科学院资源规划(ARP)集成的尝试进行介绍,包括一个ARP中不同类型科研产出数据导出工具的开发,一个基于B/S架构的Excel数据导入DSpace工具的开发,并分析如何针对不同类型的科研产出数据定制DSpace元数据输入和显示界面。  相似文献   

12.
In the present paper an attempt of data exchange between the institutional repository based on DSpace and the Academy Resource Planning System (ARP) of Chinese Academy of Sciences (CAS), which is the information environment for management of scientific research in CAS, was described. It includes the development of a tool based on browser which imports data from EXCEL into DSpace and a tool which exports data from DSpace into EXCEL. Consequently, data can be exchanged between ARP and DSpace through EXCEL. In addition, the way to customize the input form and the display page according to different types of documents was introduced.  相似文献   

13.
本文分析了学术会议文献开放出版的优势,结合中国科学院科学数据、学位论文、科技成果、ARP、科技期刊开放出版等数字资源的相关研究,提出了建立中国科学院学术会议文献开放出版系统的设想,借鉴开放期刊的运行模式,以CC协议方式实现系统资源的版权保护,完善中国科学院的数字资源体系。  相似文献   

14.
This article examines the persuasive attacks made against Rush Limbaugh after his insults of Georgetown Law student Sandra Fluke. The persuasive attacks against Limbaugh attempted to increase perceptions of his responsibility for the acts, but the majority worked to increase the perceived offensiveness of his acts. The most successful attacks extended Limbaugh's attacks to the audience, pointed out Limbaugh's own inconsistencies, applied pejorative labels to Limbaugh's words, and linked Limbaugh to the positions and ideologies of the Republican Party. The analysis found that the attacks were successful in the short-run, but less so in the long-term.  相似文献   

15.
论述采用基于QinQ业务数据分流的多校区图书馆组网模式,为不同的数据流嵌套不同的内外层VLAN标签,不仅能够实现各分馆间VPN专网互联的需求,同时还能够根据不同应用对各种业务进行数据分流和精细化管理,有效解决长期以来存在的安全访问控制难、业务保障区分难以及ARP病毒泛滥、IP地址冲突等诸多难题,进一步提高多校区图书馆的网上服务质量。  相似文献   

16.
ABSTRACT

This article discusses how RADAR, the institutional repository (IR) at the Glasgow School of Art (GSA), has been modified to house an Annual Research Planning (ARP) template. A case study on the implementation of this research planning tool will outline the role that a repository and its staff can play in supporting individuals, enhancing processes, and helping to reach strategic institutional goals in preparing for the next Research Excellence Framework (REF). The paper will also investigate how the extension of RADAR to incorporate Current Research Information System (CRIS) elements has led to increased user engagement and has successfully demonstrated a new use for the repository beyond its scholarly communication function.  相似文献   

17.
Cities are becoming smarter and smarter. While the rapid progress in smart city technologies is changing cities and the lifestyle of the people, it creates also huge attack surfaces for potential cyber attacks. The potential vulnerabilities of smart city products and imminent attacks on smart city infrastructure and services will have significant consequences that can cause substantial economic and noneconomic losses, even chaos, to the cities and the people. In this paper we study alternative economic solutions ranging from incentive mechanisms to market-based solutions to motivate governments, smart product vendors, and vulnerability researchers and finders to improve the cybersecurity of smart cities and e-government. These solutions can be integrated into policy instruments in defending smart cities and e-governments against cyber attacks.  相似文献   

18.
The federal government's war on terrorism has heightened understanding and appreciation of the many facets of electronic government. Electronic government is used as a resource in the war on terrorism, helping to prevent and prepare for attacks. It might also prove useful in recovering from attacks. Unfortunately, e-government itself is a likely target for terrorists. Cyber intrusions into government Web sites and damage to, or destruction of, infrastructure, whether a computer system or an electrical grid that supplies power, could impair e-government. E-government is also attractive as a potential target for the information it provides, information that enemies of the United States could use in identifying weaknesses and planning attacks. While the Bush Administration has developed a comprehensive policy, based on a market model, for facilitating the use and effectiveness of e-government, its approach to e-government security, particularly in the area of Web content, has been ad hoc. Soon after the September 11, 2001, attacks, federal agencies began scrubbing their Web sites, an effort that has implications for the notion, and practice, of having a well-informed citizenry.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号