会议专题

Research on flag-based network scanning technology

  In order to realize data transmission on the network,data needs to be encapsulated layer by layer.In the process of encapsulated data,different kinds of control information need to be added.This control information are necessary to realize network communication.Flag identity bits in data packets are the key part of establishing and closing communication session connections,and also the key to controlling the data transmission process.At the same time,flag identity bits become the vulnerabilities exploited by infiltrators.This paper studies the characteristic of data package encapsulation and the role of flag tag bit in the process of network connection and data transmission.Combining with the characteristics of network penetration,it puts forward the conclusion that flag tag bit has potential security risks,and points out a new direction for network security protection in this paper.

encapsulation network security network vulnerability

Guofang Zhang

Hainan College of software Technology,Qionghai,China

国际会议

2019年第二届智能系统研究与机电工程国际会议(ISRME 2019) 2019 2nd International Conference on Intelligent Systems Research and Mechatronics Engineering

太原

英文

395-398

2019-06-29(万方平台首次上网日期,不代表论文的发表时间)