• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2010, Vol. 32 ›› Issue (12): 15-18.doi: 10.3969/j.issn.1007130X.2010.

• 论文 • 上一篇    下一篇

基于MAC欺骗技术的嗅探器原型设计与实现

陈信男1,胡华平1,2,岳虹2   

  1. (1.福州大学数学与计算机科学学院,福建 福州 350108;2.61070部队,福建 福州  350003)
  • 收稿日期:2009-11-02 修回日期:2010-01-20 出版日期:2010-12-25 发布日期:2010-12-25
  • 通讯作者: 陈信男
  • 作者简介:陈信男(1985),男,福建龙海人,硕士生,研究方向为网络安全和密码学;胡华平,博士后,教授,博士生导师,研究方向为信息安全和密码学;岳虹,博士,研究方向为计算机体系结构和网络安全。
  • 基金资助:

    网络安全与密码技术福建省高校重点实验室开放课题基金资助项目(07A004)

Design and Implementation of the Sniffer Prototype Based on the MAC Spoofing

CHEN Xinnan1,Hu Huaping1,2,YUE Hong2   

  1. (1.School of Mathematics and Computer Science,Fuzhou University,Fuzhou 350108;2.Corps 61070,Fuzhou 350003,China)
  • Received:2009-11-02 Revised:2010-01-20 Online:2010-12-25 Published:2010-12-25

摘要:

在基于交换环境的局域网内,针对ARP欺骗技术的防御手段日益成熟,导致基于ARP欺骗技术的嗅探器极易受到安全防护软件的拦截与查杀,失去嗅探效果。本文提出了一种非ARP欺骗技术,即MAC欺骗技术,并设计与实现了一种基于MAC欺骗技术的局域网嗅探器原型。与传统ARP欺骗技术相比,这种欺骗技术可以绕过多种ARP防御工具,成功截取网络数据以及对目标主机进行拒绝服务攻击。本文通过采用时间交替机制、过滤机制等多种关键技术,有效地提高了嗅探器的效率和准确率。经过测试,本嗅探器可较好地突破安全防护软件的拦截与查杀,实现嗅探效果。

关键词: ARP欺骗, MAC欺骗, 交换环境, 局域网, 嗅探器

Abstract:

In the switchbased LAN environment,the means of defending the ARP spoofing is maturing,leading to the sniffer based on the ARP spoofing is vulnerable to being intercepted and killed by security software,so it lacks sniffing effect. In this paper,one nonARP spoofing,which is called MAC spoofing,is proposed,and a LAN sniffer prototype based on the MAC spoofing is also designed and implemented. Compared with the  traditional ARP spoofing,the MAC spoofing can bypass a variety of ARP spoofing defense tools and succeed to intercept the network data,as well as carrying on the Denial of Service attacks. Through the use of a timealternate mechanism,a filtering mechanism and other key technologies,the efficiency and accuracy of the sniffer can be highly improved. The testing result shows that the sniffer may be better to break through the interception and killing of security software,and achieve the effect of sniffing.

Key words: ARP spoofing;MAC spoofing;switch environment;LAN;sniffer