首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

The Research on Combating TCP Based Attacks on Mobile Devices

Abstract第5页
摘要第6-7页
Acknowledgment第7-10页
List of figure第10页
List of table第10-11页
CHAPTER ONE第11-22页
    1.1 Introduction第11-12页
    1.2 Transmission Control Protocol (TCP)第12-13页
    1.3 TCP based network services第13页
    1.4 Attacks第13-19页
        1.4.1 Denial of Service Attacks (DoS)第14-16页
        1.4.2 Distributed Denial of Service Attacks (DDoS)第16-18页
        1.4.3 TCP based Attacks第18-19页
    1.5 Mobile devices第19-21页
        1.5.1 Attacks on mobile devices第19-20页
        1.5.2 Effects of attacks on mobile devices第20-21页
    1.6 Outline第21-22页
CHAPTER TWO: HOW ATTACKERS EXPLOIT TCP OPERATION第22-35页
    2.1 TCP connection mechanism第22-23页
    2.2 TCP segment structure第23-29页
        2.2.1 TCP operations第24-29页
            2.2.1.1 TCP connection establishment第25页
            2.2.1.2 TCP data transfer第25-29页
    2.3 Exploiting the TCP 3 handshakes第29-34页
        2.3.1 Spoofed SYN requests第29-30页
        2.3.2 Spoofed ACKs第30-31页
        2.3.3 Spoofed RSTs第31-32页
        2.3.4 IP spoofing第32-33页
        2.3.5 Other TCP based attacks第33-34页
            2.3.5.1 Port scanning第33-34页
    2.4 Effects of TCP flooding attacks第34-35页
CHAPTER THREE: FIREWA第35-44页
    3.1 What is firewall第35-36页
    3.2 Types of firewalls第36-38页
    3.3 Functions of firewalls第38页
    3.4 Who needs a firewall第38页
    3.5 Firewalls for mobile devices第38-40页
    3.6 Existing firewall based solutions第40-43页
    3.7 Trend of firewall based solutions第43-44页
CHAPTER FOUR:COMBATING MECHANISMS FOR TCP BASED ATTACK第44-61页
    4.1 Easy to use Firewall Design I (EFD I)第44-50页
        4.1.1 Dealing with legitimate clients第46-47页
        4.1.2 Dealing with illegitimate clients第47-48页
        4.1.3 Preventing spoofed SYN requests, RST and ACK第48页
        4.1.4 Handling spoofed SYN requests第48-49页
        4.1.5 Handling spoofed RST第49页
        4.1.6 Handling spoofed ACK第49-50页
        4.1.7 Handling spoofed IP addresses第50页
    4.2 Easy to use Firewall Design II (EFD II)第50-56页
        4.2.1 Dealing with legitimate clients第52页
        4.2.2 Dealing with illegitimate clients第52-53页
        4.2.3 Preventing spoofed SYN requests, RST and ACK第53-54页
        4.2.4 Handling spoofed SYN requests第54-55页
        4.2.5 Handling spoofed RST第55页
        4.2.6 Handling spoofed ACK第55-56页
        4.2.7 Handling spoofed IP addresses第56页
    4.3 Implementation considerations第56-59页
        4.3.1 Environment for Easy to use Firewall Design I第56-57页
        4.3.2 Environment for Easy to use Firewall Design II第57页
        4.3.3 Setting up Firewall第57-58页
        4.3.4 Description of the environment第58-59页
            4.3.4.1 Hardware第58页
            4.3.4.2 Software第58-59页
    4.4 Results and Data Analysis第59-61页
        4.4.1 Discussion for Easy to use Firewall Design I第59-60页
        4.4.2 Discussion for Easy to use Firewall Design II第60-61页
CHAPTER FIVE CONCLUSION第61-62页
REFERENCES第62-66页
APPENDIX A第66-68页
APPENDIX B第68-69页

论文共69页,点击 下载论文
上一篇:几类完全模糊线性系统模糊近似解的讨论
下一篇:网络游戏虚拟物品的消费者权益保护