Wednesday, September 18, 2013


Ağ trafiğinin analizi, belirlenmesi ve engellenmesi türkçe kılavuz pdf yandexdisk



[postlink]http://net4story.blogspot.com/2013/09/ag-trafiginin-analizi-belirlenmesi-ve.html[/postlink]ağ içi trafik analizi

İçindekiler
Özet...............................................................................................................................................................
1 .Giriş............................................................................................................................................
2.Paket ..3
2. 1 Paket dinle yicilerin zararları..........................................................................................................
2.2 Pomiscuous mod....................................................................................................................
2.3 Shared Ethernet...............................................................................................................................
2.4 Switched Ethernet.......................................................................................................................
3. Paket dinleme ..8
3. 1 IP ­temelli paket dinleme...........................................................................................................
3.2 MAC­ temelli paket dinleme...................................................................................................
3.3 ARP­based sniffing................................................................................................................... ......9
4.Paket dinlemeyi T esbit etme...........................................................................................................
4. 1 Local host seviyesine belirleme (host­based)....................................................... ............................1
4.2. MAC tabanlı Paket dinlemeyi belirleme.....................................................................................
4.2. 1 Arp metodu........................................................................................................................... ......12
4.2.2 ARP Watch..................................................................................................................... ............13
4.2.3 Gecikme süresi Metodu............................................................................................... ..............13
4.2.4 IDS kullanma.................................................................................................... .........................1 4
4.3 Aldatma metodu......................................................................................................................
5. Trafik analizine Engel olma...........................................................................................
5. 1 Şifreleme : .............................................................................................................
6. Sonuç.......................................................................................................................................
7 . Kaynaklar...............................................................................................................................................


http://yadi.sk/d/2D2ITT4x9UFfA




0 yorum:

Post a Comment