In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes.
Table of Contents
1. INTRODUCTION
2. RELATED WORK
3. NETWORK SECURITY THREAT MODELS
3.1 a. FLOODING
3.2 b. KEYLOGERS
3.3 c. TROJANS
3.4 d. BLUETOOTH
3.5 e. PHISING
3.6 f. RADIO JAMMING
3.7 g. WIRE SNIFFERS
3.8 h. COMPROMISED SERVERS
3.9 i. SERVER SECURITY HOLES
3.10 j. ZERO DAY/HOUR ATTACK
4. CONCLUSION
Research Objectives and Themes
This report provides an extensive survey of contemporary network security threats and cyber-attack methodologies. The primary objective is to analyze common vulnerabilities in network components and evaluate existing defense mechanisms to guide the development of more robust security infrastructures.
- Classification and analysis of various network attack types (DoS, DDoS, etc.).
- Examination of specific threat models including keyloggers, trojans, and phishing.
- Evaluation of mitigation strategies for infrastructure-level and packet-level threats.
- Identification of best practices for securing network services and data integrity.
Excerpt from the Book
b. KEYLOGERS
These are simple software codes that exploit what we call ‘hooks’ on a computer’s kernel. Hooks capture vital hardware traffic like Keystrokes and mouse movements. Software based Key loggers are programmed to capture any button stroke you type on the keyboard and save words as a text file. That includes all private information you type like Passwords, Google searches, Credit card number, emails, to name but a few. Regularly updating of the Antivirus is a sure way to beat this. Let it also be known that Hardware key loggers exist, masquerading as flash disks. USB password applications should deter such.
Summary of Chapters
1. INTRODUCTION: Outlines the increasing dependence on global networks and the resulting rise in vulnerability to cyber attacks that threaten individual and organizational security.
2. RELATED WORK: Reviews existing academic literature on network attack classification, specifically focusing on mitigation techniques for DoS and DDoS threats.
3. NETWORK SECURITY THREAT MODELS: Details specific common attack vectors such as flooding, keylogging, and server-side exploits, providing a technical overview of how each functions.
4. CONCLUSION: Summarizes the necessity of a dedicated security organ within infrastructures and suggests essential components for comprehensive protection.
Keywords
Network Security, Cyber Attacks, DoS, DDoS, Flooding, Keyloggers, Trojans, Phishing, Radio Jamming, Compromised Servers, Zero Day Attack, Infrastructure Protection, Data Integrity, Vulnerability Assessment, Security Mitigation.
Frequently Asked Questions
What is the fundamental purpose of this technical report?
The report aims to survey current network security threats and examine the vulnerabilities inherent in modern network infrastructures to better inform defensive strategies.
What are the primary thematic areas covered?
The core themes include the classification of network attacks, specific technical threat models, and various methodologies used by attackers to gain unauthorized access.
What is the core research goal?
The goal is to provide a comprehensive analysis of common exploits and to highlight the importance of implementing robust, multi-layered security measures to protect systems.
Which scientific or analytical methods are applied?
The paper utilizes a literature review and a comparative analysis of existing research, including topological environment modeling and anomaly-based metrics, to evaluate security performance.
What topics are discussed in the main body?
The main body covers a wide range of attack vectors, from packet-level threats and DDoS flooding to specific software exploits like keyloggers, trojans, and zero-day vulnerabilities.
What are the characterizing keywords of this work?
Key terms include Network Security, DDoS, Cyber Attacks, Infrastructure Protection, and various specific threat models like Phishing and Zero-Day attacks.
How do 'Passive' and 'Active' attacks differ according to the report?
Passive attacks involve monitoring and observing data without altering system resources, whereas active attacks involve deliberate interaction with the system, often compromising integrity or availability.
What does the report suggest regarding 'Zero Day' attacks?
It emphasizes that these attacks target undiscovered software vulnerabilities and suggests that users report bugs to manufacturers promptly to prevent exploitation before patches are issued.
- Arbeit zitieren
- Santosh Malhotra (Autor:in), Amit Kumar (Autor:in), 2018, Survey on Network Security Threats and Attacks, München, GRIN Verlag, https://www.grin.com/document/445068