Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Survey on Network Security Threats and Attacks

Title: Survey on Network Security Threats and Attacks

Academic Paper , 2018 , 10 Pages , Grade: 1

Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes.

Excerpt


Table of Contents

1. INTRODUCTION

2. RELATED WORK

3. NETWORK SECURITY THREAT MODELS

3.1 a. FLOODING

3.2 b. KEYLOGERS

3.3 c. TROJANS

3.4 d. BLUETOOTH

3.5 e. PHISING

3.6 f. RADIO JAMMING

3.7 g. WIRE SNIFFERS

3.8 h. COMPROMISED SERVERS

3.9 i. SERVER SECURITY HOLES

3.10 j. ZERO DAY/HOUR ATTACK

4. CONCLUSION

Research Objectives and Themes

This report provides an extensive survey of contemporary network security threats and cyber-attack methodologies. The primary objective is to analyze common vulnerabilities in network components and evaluate existing defense mechanisms to guide the development of more robust security infrastructures.

  • Classification and analysis of various network attack types (DoS, DDoS, etc.).
  • Examination of specific threat models including keyloggers, trojans, and phishing.
  • Evaluation of mitigation strategies for infrastructure-level and packet-level threats.
  • Identification of best practices for securing network services and data integrity.

Excerpt from the Book

b. KEYLOGERS

These are simple software codes that exploit what we call ‘hooks’ on a computer’s kernel. Hooks capture vital hardware traffic like Keystrokes and mouse movements. Software based Key loggers are programmed to capture any button stroke you type on the keyboard and save words as a text file. That includes all private information you type like Passwords, Google searches, Credit card number, emails, to name but a few. Regularly updating of the Antivirus is a sure way to beat this. Let it also be known that Hardware key loggers exist, masquerading as flash disks. USB password applications should deter such.

Summary of Chapters

1. INTRODUCTION: Outlines the increasing dependence on global networks and the resulting rise in vulnerability to cyber attacks that threaten individual and organizational security.

2. RELATED WORK: Reviews existing academic literature on network attack classification, specifically focusing on mitigation techniques for DoS and DDoS threats.

3. NETWORK SECURITY THREAT MODELS: Details specific common attack vectors such as flooding, keylogging, and server-side exploits, providing a technical overview of how each functions.

4. CONCLUSION: Summarizes the necessity of a dedicated security organ within infrastructures and suggests essential components for comprehensive protection.

Keywords

Network Security, Cyber Attacks, DoS, DDoS, Flooding, Keyloggers, Trojans, Phishing, Radio Jamming, Compromised Servers, Zero Day Attack, Infrastructure Protection, Data Integrity, Vulnerability Assessment, Security Mitigation.

Frequently Asked Questions

What is the fundamental purpose of this technical report?

The report aims to survey current network security threats and examine the vulnerabilities inherent in modern network infrastructures to better inform defensive strategies.

What are the primary thematic areas covered?

The core themes include the classification of network attacks, specific technical threat models, and various methodologies used by attackers to gain unauthorized access.

What is the core research goal?

The goal is to provide a comprehensive analysis of common exploits and to highlight the importance of implementing robust, multi-layered security measures to protect systems.

Which scientific or analytical methods are applied?

The paper utilizes a literature review and a comparative analysis of existing research, including topological environment modeling and anomaly-based metrics, to evaluate security performance.

What topics are discussed in the main body?

The main body covers a wide range of attack vectors, from packet-level threats and DDoS flooding to specific software exploits like keyloggers, trojans, and zero-day vulnerabilities.

What are the characterizing keywords of this work?

Key terms include Network Security, DDoS, Cyber Attacks, Infrastructure Protection, and various specific threat models like Phishing and Zero-Day attacks.

How do 'Passive' and 'Active' attacks differ according to the report?

Passive attacks involve monitoring and observing data without altering system resources, whereas active attacks involve deliberate interaction with the system, often compromising integrity or availability.

What does the report suggest regarding 'Zero Day' attacks?

It emphasizes that these attacks target undiscovered software vulnerabilities and suggests that users report bugs to manufacturers promptly to prevent exploitation before patches are issued.

Excerpt out of 10 pages  - scroll top

Details

Title
Survey on Network Security Threats and Attacks
Grade
1
Authors
Santosh Malhotra (Author), Amit Kumar (Author)
Publication Year
2018
Pages
10
Catalog Number
V445068
ISBN (eBook)
9783668818347
ISBN (Book)
9783668818354
Language
English
Tags
survey network security threats attacks
Product Safety
GRIN Publishing GmbH
Quote paper
Santosh Malhotra (Author), Amit Kumar (Author), 2018, Survey on Network Security Threats and Attacks, Munich, GRIN Verlag, https://www.grin.com/document/445068
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  10  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint