In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes. This paper discusses the possible exploits on typical network components; it will cite real life scenarios, and causes. At the end of this paper conclusion is provided to guide contributors for the development of more security measures to prevent network attacks.
2. RELATED WORK
Network security threats have been studied extensively by the research community. Network Attacks can be also classified [1,2,3] as a) Passive attack b) Active attack c) Distributed attack d) Insider attack and e) Close-in attack. Attacks can be also on the infrastructure level such as on the cloud  DDoS [5, 6, 7], or routers . In , author addressed the importance of network attacks at the cloud level and some key mitigation techniques. He explained that many attacks can still cause great harm to Cloud Computing, impacting all the important security aspects (confidentiality, integrity, isolation, availability, etc.). Among those attacks, the DoS and DDoS attacks are arguably the easiest to mount and the most destructive, yet huge gaps still exist to efficiently deal with those attacks. DDoS attacks were studied extensively by the research community [5, 6, 7]. Ahmad Sanmorino  has proposed a pattern of matching detection technique that overcome the drawbacks of the other detection techniques of the DDoS attacks. Traffic flows through the network is checked based on the specified pattern and can easily find that packet is malicious or not. This technique of detection has an advantage of lower cost of infrastructure since it only uses routers and switches which exist already. It does not use high technology resources such as multicore CPU technology. This paper shows three topological environment which consists of 3 phases. In the 1st environment normal behavior of the traffic was shown, In the second phase unsecured network with attacks launched on it was shown. In the third phase handling of the attack was shown with firewall and successful dropout the packets.
In  Adrien Bonguet and Martine Bellaiche presented some state-of-the-art solutions: some were rather easy to incorporate in existing Cloud infrastructures for Cloud providers to prevent or reduce DoS and DDoS attacks and in , they shown that there are various detection and mitigation mechanisms to prevent the network from various kinds of DDoS attacks, also they gives a survey about various kinds of DDoS attacks and how to handle them. It helps to give a basic idea of the techniques to the reader who wants to get started his research work from network security. In  Kamal Ahmat and Ammar Elnour discussed threats at the packet level and introduced a simple yet effective method to overcome this issue.
PyungKoo  has studied that pseudo states in the router are one of the best method to protect the services. As routers, switches and other devices on the network are not much capable to differentiate between all the packets so the service oriented based detection mechanism using pseudo state (SDM-P) is used to counter the attack packets before it falls into the network. A Hash key algorithm is used to evaluate the performance of this detection scheme. In other techniques the attack is detected when the services accommodation gets down, but proposed technique is used for the detection before entering the data packets. The implementation has done on the NS-2 platform to identify the difference between the packets whether it is legitimate packet out the attacker’s packet.
Saman Taghavi  has presented about DDOS flooding attack as it is one of the challenging issue to prevent the network security. In this type of attack an armies are set up to launch an attack. Various computers are hired by an attacker, it is called botnets or Zombies, the coordinated attack is performed by all the hired computers. The appropriate defense mechanism is required to bar the DDOS flooding attacks. The purpose of this paper is to seek about DDOS flooding trouble and the various steps to encounter it. The Study is about the consideration of previous counter steps to handle the DDOS Flooding attacks. The main consideration of this paper is to give the survey of traditional and current handling mechanism which helps the research community to develop their DDOS flooding handling problem when or after attack launched. IlkerOzcelik  has presented about the detection approach on Denial of Services. The detection is based on the anomaly based metrics. The Cumulative Sum (Custom) approach has applied to detect the effect of the attack on the network. This algorithm is performing at high and low bandwidth of the network. The main purpose of this work is to show the better detection results with the custom algorithm as it reduces the utilization of the network. This whole work was performed by using the background traffic in the paper’s scenario.
- Quote paper
- Santosh Malhotra (Author)Amit Kumar (Author), 2018, Survey on Network Security Threats and Attacks, Munich, GRIN Verlag, https://www.grin.com/document/445068