目录摘要.................................................................................................................................................I英文摘要..........................................................................................................................................II1绪论............................................................................................................................................11.1课题的来由简介..................................................................................................................11.2国内外网络与信息系统安全简介.......................................................................................12TCP/IP协议栈简介......................................................................................................................43TCP/IP协议栈的安全问题..........................................................................................................73.1ICMP攻击..............................................................................................................................73.2TCP的“SYN”攻击..............................................................................................................73.3序列号攻击..........................................................................................................................73.4截取连接..............................................................................................................................84TCP/IP协议栈安全问题对策..............................................................................................................144.1威胁网络安全的主要因素.................................................................................................144.2TCP/IP协议栈安全具体对策............................................................................................144.2.1认证问题..................................................................................................................144.2.2保密问题..................................................................................................................164.2.3截取连接问题...........................................................................................................174.2.4TCP会话劫持............................................................................................................174.2.5“SYN”攻击..............................................................................................................174.2.6IP地址欺骗..............................................................................................................184.2.7IP碎片攻击..............................................................................................................184.2.8序列号攻击..............................................................................................................194.2.9用户名的问题...........................................................................................................194.2.10其他协议和工具.......................................................................................................194.3入侵检测............................................................................................................................194.3.1安全防御体系....................