The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
As analysing the principle of the ARP spoofing, some solutions for the spoofing are mentioned, such as the binding of MAC IP address and the configuration of switch.
随后分析了ARP欺骗的实现原理,给出了MACIP绑定、交换机设置等一系列解决问题的方案。
As analysing the principle of the ARP spoofing, some solutions for the spoofing are mentioned, such as the binding of MAC IP address and the configuration of switch.
随后分析了ARP欺骗的实现原理,给出了MACIP绑定、交换机设置等一系列解决问题的方案。
应用推荐