Grin logo
de en es fr
Boutique
GRIN Website
Publier des textes, profitez du service complet
Aller à la page d’accueil de la boutique › Informatique - Sécurité des Données

Survey on Network Security Threats and Attacks

Titre: Survey on Network Security Threats and Attacks

Texte Universitaire , 2018 , 10 Pages , Note: 1

Autor:in: Santosh Malhotra (Auteur), Amit Kumar (Auteur)

Informatique - Sécurité des Données
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes.

Extrait


Table of Contents

1. INTRODUCTION

2. RELATED WORK

3. NETWORK SECURITY THREAT MODELS

3.1 a. FLOODING

3.2 b. KEYLOGERS

3.3 c. TROJANS

3.4 d. BLUETOOTH

3.5 e. PHISING

3.6 f. RADIO JAMMING

3.7 g. WIRE SNIFFERS

3.8 h. COMPROMISED SERVERS

3.9 i. SERVER SECURITY HOLES

3.10 j. ZERO DAY/HOUR ATTACK

4. CONCLUSION

Research Objectives and Themes

This report provides an extensive survey of contemporary network security threats and cyber-attack methodologies. The primary objective is to analyze common vulnerabilities in network components and evaluate existing defense mechanisms to guide the development of more robust security infrastructures.

  • Classification and analysis of various network attack types (DoS, DDoS, etc.).
  • Examination of specific threat models including keyloggers, trojans, and phishing.
  • Evaluation of mitigation strategies for infrastructure-level and packet-level threats.
  • Identification of best practices for securing network services and data integrity.

Excerpt from the Book

b. KEYLOGERS

These are simple software codes that exploit what we call ‘hooks’ on a computer’s kernel. Hooks capture vital hardware traffic like Keystrokes and mouse movements. Software based Key loggers are programmed to capture any button stroke you type on the keyboard and save words as a text file. That includes all private information you type like Passwords, Google searches, Credit card number, emails, to name but a few. Regularly updating of the Antivirus is a sure way to beat this. Let it also be known that Hardware key loggers exist, masquerading as flash disks. USB password applications should deter such.

Summary of Chapters

1. INTRODUCTION: Outlines the increasing dependence on global networks and the resulting rise in vulnerability to cyber attacks that threaten individual and organizational security.

2. RELATED WORK: Reviews existing academic literature on network attack classification, specifically focusing on mitigation techniques for DoS and DDoS threats.

3. NETWORK SECURITY THREAT MODELS: Details specific common attack vectors such as flooding, keylogging, and server-side exploits, providing a technical overview of how each functions.

4. CONCLUSION: Summarizes the necessity of a dedicated security organ within infrastructures and suggests essential components for comprehensive protection.

Keywords

Network Security, Cyber Attacks, DoS, DDoS, Flooding, Keyloggers, Trojans, Phishing, Radio Jamming, Compromised Servers, Zero Day Attack, Infrastructure Protection, Data Integrity, Vulnerability Assessment, Security Mitigation.

Frequently Asked Questions

What is the fundamental purpose of this technical report?

The report aims to survey current network security threats and examine the vulnerabilities inherent in modern network infrastructures to better inform defensive strategies.

What are the primary thematic areas covered?

The core themes include the classification of network attacks, specific technical threat models, and various methodologies used by attackers to gain unauthorized access.

What is the core research goal?

The goal is to provide a comprehensive analysis of common exploits and to highlight the importance of implementing robust, multi-layered security measures to protect systems.

Which scientific or analytical methods are applied?

The paper utilizes a literature review and a comparative analysis of existing research, including topological environment modeling and anomaly-based metrics, to evaluate security performance.

What topics are discussed in the main body?

The main body covers a wide range of attack vectors, from packet-level threats and DDoS flooding to specific software exploits like keyloggers, trojans, and zero-day vulnerabilities.

What are the characterizing keywords of this work?

Key terms include Network Security, DDoS, Cyber Attacks, Infrastructure Protection, and various specific threat models like Phishing and Zero-Day attacks.

How do 'Passive' and 'Active' attacks differ according to the report?

Passive attacks involve monitoring and observing data without altering system resources, whereas active attacks involve deliberate interaction with the system, often compromising integrity or availability.

What does the report suggest regarding 'Zero Day' attacks?

It emphasizes that these attacks target undiscovered software vulnerabilities and suggests that users report bugs to manufacturers promptly to prevent exploitation before patches are issued.

Fin de l'extrait de 10 pages  - haut de page

Résumé des informations

Titre
Survey on Network Security Threats and Attacks
Note
1
Auteurs
Santosh Malhotra (Auteur), Amit Kumar (Auteur)
Année de publication
2018
Pages
10
N° de catalogue
V445068
ISBN (ebook)
9783668818347
ISBN (Livre)
9783668818354
Langue
anglais
mots-clé
survey network security threats attacks
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Santosh Malhotra (Auteur), Amit Kumar (Auteur), 2018, Survey on Network Security Threats and Attacks, Munich, GRIN Verlag, https://www.grin.com/document/445068
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  10  pages
Grin logo
  • Grin.com
  • Expédition
  • Contact
  • Prot. des données
  • CGV
  • Imprint