SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015]
ISSN : 2454-1311
www.ijaems.com Page | 1
Different Attacks in the Network: A Review
Mohit Angurala1
, Gurinderjit Kaur2
1
Assistant Professor Department of CSE, Golden College of Engineering and technology, Gurdaspur, Punjab, India
2
Department of CSE (M. Tech Student), Golden College of Engineering and technology, Gurdaspur, Punjab, India
Abstract— Network security is protection of the files
which can be stored information in network against
hacking, misuse. Network security involves the
authorization or access to data which is controlled by the
network administrator. Users are assigned an ID and
password or other authenticating information that allows
them access to information and programs within their
authority. Today anyone person can become a hacker
which downloading tools from the internet. Nowadays
security is becoming vital in case of networking because
everyday a new kind of attack is generated which leads to
compromise our network and have security in network is
decreasing because of increase in number of attacks. In
this paper we have shown the comparison between
different types of attacks in a network in a tabular form.
Keywords—DOS, IP, Trojans, Phishing, Network
I. INTRODUCTION
The world is becoming more interconnected with the
Internet and new technology by networking. In this
security issue is that which to protect data which can be
stored into computer. Network security is typically
handled by a network administrator or system
administrator who implements the security policy,
network software and hardware needed to protect a
network and the resources accessed through the network
from unauthorized access. Many network security threats
today are spread over the Internet. The most common
include: Viruses, worms, and Trojan horses,
Eavesdropping, Data Modification, IP Spoofing,
Password Based Attacks, Denial of service Attack, Man
in the Middle Attack, Compromised Key Attack,
Phishing, Trojans, Sniffer Attack. There are different
kinds of attacks in the network security which can be
discussed below.
II. ATTACKS IN NETWORK SECURITY
Two types of attacks in network security which are as
following:-
1. Active Attack
In active attack, the attacker tries to bypass or break
information into secured systems. This attack can be done
through worms, Trojan horses, or Viruses. Active attacks
can be included to break protection of features and to
modify the information. These attacks can be involved
modification of data stream or creation of a false stream.
Replay of this attack which can be used to capture of data
unit and retransmission for an unauthorized effect. This
attack can be easy to detect because attacks can alter a
data. Result of this attack is that disclosure of data files or
modification of data.
Types of Active Attacks
1. 1 Denial of Service (DOS) attack
A Denial of Service (DOS) attack is aimed that to
preventing authorized on the network. The Denial of
Service (DOS) attack is not aimed at to collecting a data.
Aimed of denial of service is that to preventing
authorized, legitimate users from using computers or the
network normally. Denial of Service (DOS) attack can be
used to sending the invalid data to the applications or
network services until the server hangs and then simply
crashes a system. Denial of Service is an attack when the
system is to receiving too many requests but cannot return
the communication with the requestors.
1.2 IP Spoofing
IP Spoofing also known as IP address means that the
address of the trusted computer is to gain the access of the
other computers. The identity of the intruder is to be
different by making detection which can be hidden and
prevention of this attack is difficult. The intruder can be
also use the valid address of the IP or to modify data.
Administrators and Users can be used to protect
themselves and their networks by implementing or
installing the firewalls that can block the outgoing packets
with the addresses of sources that can be differ from the
IP addresses of the internal network or user’ computer.
1.3 Man-in-the-middle attacks
Man-in-the-middle attack is the form of eavesdropping
where the communication between two users is modified
or monitored by unauthorized party. In the process, two
original parties appear to normally communicate. Man-in-
the-middle attack involves an attacker by inserting
themselves which can be communicating between two
parties. The attacker could also modify the messages in
transit. This attack spoofs the opposite party and that
parties believe and they are talking to the other expected
party. Man-in-the-middle attacks are assuming your
identity in order to read your message.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015]
ISSN : 2454-1311
www.ijaems.com Page | 2
1.4 Masquerade
To pretend to be someone else. This could be logging in
with a different user account to gain extra privileges. For
example, a user of a system steals the System
Administrators username and password to be able to
pretend that they are them.
2. Passive Attack
A passive attack monitors the unencrypted traffic and
then looks for clear-text passwords and other types of
attacks can be used in sensitive information. Passive
attacks include monitoring of unprotected
communications, traffic analysis and capturing
authentication information such as passwords. Result of
passive attack is that to disclosure of data files or
information to an attacker without the knowledge of the
user. The goal of passive attack is to obtain the
information that is being transmitted. Passive attack can
be detect to difficult, because these type of attacks don’t
alter data, can be prevented, rather than detected, use of
encryption.
Types of Passive Attacks
2.1 Eavesdropping
Network sniffing or network Eavesdropping is a network
layer attack which consisting of capturing packets from
the network which can be transmitted by other computers
and reading the data content in search of sensitive
information like session tokens ,passwords, or any kind of
confidential information. These attacks based on
cryptography without strong communication services,
your data can be read by others as it traverses the
network. It is referred as snooping or sniffing when
attacker is eavesdropping on your communication.
2.2 Traffic Analysis
If information is encrypted, it will be more difficult to
read the information being sent and received, but the
attacker simply observers the information, and tries to
make sense out of it; or to simply determine the identity
and location of the two communicating parties.
2.3 Network Analysis
To simply monitor the transmission between two parties
and to capture information that is sent and received. The
attacker does not intend to interrupt the service, or cause
an effect, but to only read the information.
3. Other types of attacks
3.1 Viruses
Viruses are self ‐replication programs that use files to
infect and propagate. Once a file is opened, the virus will
activate within the system. Viruses usually lead to some
sort of data loss or system failure.
There are numerous methods by which a virus can get
into a system:
• Through infected floppy disks
• Through an e-mail attachment infected with the
virus
• Through downloading software infected with the
virus
3.2 Phishing Attack
In phishing attack the hacker creates a fake web site that
looks like a popular site such as the SBI bank . The
phishing part of the attack is that the hacker then sends an
e-mail message trying to trick the user into clicking a link
that leads to the fake site. When the user attempts to log
on with their account information, the hacker records the
username and password and then tries that information on
the real site.
3.3 Sniffer attacks
A sniffer is a device or an application that can monitor,
read or capture network data exchanges and that read
packets of network. A sniffer provides a full view of the
data inside the packet, if the packets are not encrypted.
Even encapsulated packets can be read unless and broken
open then they are encrypted and the attacker does not
have access to the key. A sniffer can analyze your
network and gain information to cause is that to crash the
system or to become corrupted. This attack
3.4 Password attacks
Aim of Password based attacks is that at guessing the
password for a system until the correct password is
determined. Weakness of primary security is that which
can be associated with password based access control is
that all security is based on the user ID and password
being utilized. The information of the password is simply
sent in plain text or clear – no form of encryption is
utilized. Remember that network attackers can obtain
password information and user ID and then pose as
authorized users and attack the corporate network. The
attacker has the same rights as the real user, when an
attacker finds a valid user account.
We have selected following attacks and have compared
the level how much harmful is that attack for our
network:
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015]
ISSN : 2454-1311
www.ijaems.com Page | 2
1.4 Masquerade
To pretend to be someone else. This could be logging in
with a different user account to gain extra privileges. For
example, a user of a system steals the System
Administrators username and password to be able to
pretend that they are them.
2. Passive Attack
A passive attack monitors the unencrypted traffic and
then looks for clear-text passwords and other types of
attacks can be used in sensitive information. Passive
attacks include monitoring of unprotected
communications, traffic analysis and capturing
authentication information such as passwords. Result of
passive attack is that to disclosure of data files or
information to an attacker without the knowledge of the
user. The goal of passive attack is to obtain the
information that is being transmitted. Passive attack can
be detect to difficult, because these type of attacks don’t
alter data, can be prevented, rather than detected, use of
encryption.
Types of Passive Attacks
2.1 Eavesdropping
Network sniffing or network Eavesdropping is a network
layer attack which consisting of capturing packets from
the network which can be transmitted by other computers
and reading the data content in search of sensitive
information like session tokens ,passwords, or any kind of
confidential information. These attacks based on
cryptography without strong communication services,
your data can be read by others as it traverses the
network. It is referred as snooping or sniffing when
attacker is eavesdropping on your communication.
2.2 Traffic Analysis
If information is encrypted, it will be more difficult to
read the information being sent and received, but the
attacker simply observers the information, and tries to
make sense out of it; or to simply determine the identity
and location of the two communicating parties.
2.3 Network Analysis
To simply monitor the transmission between two parties
and to capture information that is sent and received. The
attacker does not intend to interrupt the service, or cause
an effect, but to only read the information.
3. Other types of attacks
3.1 Viruses
Viruses are self ‐replication programs that use files to
infect and propagate. Once a file is opened, the virus will
activate within the system. Viruses usually lead to some
sort of data loss or system failure.
There are numerous methods by which a virus can get
into a system:
• Through infected floppy disks
• Through an e-mail attachment infected with the
virus
• Through downloading software infected with the
virus
3.2 Phishing Attack
In phishing attack the hacker creates a fake web site that
looks like a popular site such as the SBI bank . The
phishing part of the attack is that the hacker then sends an
e-mail message trying to trick the user into clicking a link
that leads to the fake site. When the user attempts to log
on with their account information, the hacker records the
username and password and then tries that information on
the real site.
3.3 Sniffer attacks
A sniffer is a device or an application that can monitor,
read or capture network data exchanges and that read
packets of network. A sniffer provides a full view of the
data inside the packet, if the packets are not encrypted.
Even encapsulated packets can be read unless and broken
open then they are encrypted and the attacker does not
have access to the key. A sniffer can analyze your
network and gain information to cause is that to crash the
system or to become corrupted. This attack
3.4 Password attacks
Aim of Password based attacks is that at guessing the
password for a system until the correct password is
determined. Weakness of primary security is that which
can be associated with password based access control is
that all security is based on the user ID and password
being utilized. The information of the password is simply
sent in plain text or clear – no form of encryption is
utilized. Remember that network attackers can obtain
password information and user ID and then pose as
authorized users and attack the corporate network. The
attacker has the same rights as the real user, when an
attacker finds a valid user account.
We have selected following attacks and have compared
the level how much harmful is that attack for our
network:

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Md. Asifur Rahman Siddiki
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
IJERA Editor
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
Faizan Shaikh
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Em36849854
Em36849854Em36849854
Em36849854
IJERA Editor
 
Network and web security
Network and web securityNetwork and web security
Network and web security
Nitesh Saitwal
 
this is test for today
this is test for todaythis is test for today
this is test for today
DreamMalar
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Internet security
Internet securityInternet security
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Network security ppt
Network security pptNetwork security ppt
why security is needed
why security is neededwhy security is needed
why security is needed
sourov_das
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
New Horizons Bulgaria
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Em36849854
Em36849854Em36849854
Em36849854
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Internet security
Internet securityInternet security
Internet security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
why security is needed
why security is neededwhy security is needed
why security is needed
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

Viewers also liked

Chris brown feat brandy pitch
Chris brown feat brandy  pitchChris brown feat brandy  pitch
Chris brown feat brandy pitch
Rashaan Kymali
 
Amit's resume
Amit's resumeAmit's resume
Amit's resume
Amit Goel
 
Strategi for sosiale medier
Strategi for sosiale medierStrategi for sosiale medier
Strategi for sosiale medier
elisabethzahl
 
Pepper bell insects A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
Pepper bell insects  A Lecture By Allah Dad Khan Provincial Coordinator IPM M...Pepper bell insects  A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
Pepper bell insects A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
Mr.Allah Dad Khan
 
задания с3(химия)
задания с3(химия)задания с3(химия)
задания с3(химия)
irinadmitruk
 
seminar on psychology
seminar on psychologyseminar on psychology
seminar on psychology
teenzzzzz
 
Truman power point
Truman power point Truman power point
Truman power point
nivasfuleco
 
康委(晨曦社)
康委(晨曦社)康委(晨曦社)
康委(晨曦社)
立群 鄭
 
1 10 subitising
1 10 subitising1 10 subitising
1 10 subitising
forslsh
 
LETTER WRITING
LETTER WRITINGLETTER WRITING
LETTER WRITING
Reshamya
 
Zucchini insects A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
Zucchini insects   A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...Zucchini insects   A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
Zucchini insects A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
Mr.Allah Dad Khan
 
Media music vid analysis
Media music vid analysisMedia music vid analysis
Media music vid analysis
AshleyAS
 

Viewers also liked (13)

Press_Puglia
Press_PugliaPress_Puglia
Press_Puglia
 
Chris brown feat brandy pitch
Chris brown feat brandy  pitchChris brown feat brandy  pitch
Chris brown feat brandy pitch
 
Amit's resume
Amit's resumeAmit's resume
Amit's resume
 
Strategi for sosiale medier
Strategi for sosiale medierStrategi for sosiale medier
Strategi for sosiale medier
 
Pepper bell insects A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
Pepper bell insects  A Lecture By Allah Dad Khan Provincial Coordinator IPM M...Pepper bell insects  A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
Pepper bell insects A Lecture By Allah Dad Khan Provincial Coordinator IPM M...
 
задания с3(химия)
задания с3(химия)задания с3(химия)
задания с3(химия)
 
seminar on psychology
seminar on psychologyseminar on psychology
seminar on psychology
 
Truman power point
Truman power point Truman power point
Truman power point
 
康委(晨曦社)
康委(晨曦社)康委(晨曦社)
康委(晨曦社)
 
1 10 subitising
1 10 subitising1 10 subitising
1 10 subitising
 
LETTER WRITING
LETTER WRITINGLETTER WRITING
LETTER WRITING
 
Zucchini insects A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
Zucchini insects   A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...Zucchini insects   A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
Zucchini insects A Lecture By Allah Dad Khan Provincial Coordinator IPM MIN...
 
Media music vid analysis
Media music vid analysisMedia music vid analysis
Media music vid analysis
 

Similar to 1 ijaems sept-2015-3-different attacks in the network a review

Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty3
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive Attak
Souma Maiti
 
Network security
Network securityNetwork security
Network security
nafisarayhana1
 
A Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer NetworkA Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer Network
Allison Thompson
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
Padamata Rameshbabu
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY1
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
sangeeta borde
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
Kushagr sharma
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
Ni
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
SyvilMaeTapinit
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 

Similar to 1 ijaems sept-2015-3-different attacks in the network a review (20)

Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Types of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive AttakTypes of Cyber Security Attacks- Active & Passive Attak
Types of Cyber Security Attacks- Active & Passive Attak
 
Network security
Network securityNetwork security
Network security
 
A Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer NetworkA Literature Review On Sniffing Attacks In Computer Network
A Literature Review On Sniffing Attacks In Computer Network
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Recently uploaded

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Recently uploaded (20)

Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

1 ijaems sept-2015-3-different attacks in the network a review

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015] ISSN : 2454-1311 www.ijaems.com Page | 1 Different Attacks in the Network: A Review Mohit Angurala1 , Gurinderjit Kaur2 1 Assistant Professor Department of CSE, Golden College of Engineering and technology, Gurdaspur, Punjab, India 2 Department of CSE (M. Tech Student), Golden College of Engineering and technology, Gurdaspur, Punjab, India Abstract— Network security is protection of the files which can be stored information in network against hacking, misuse. Network security involves the authorization or access to data which is controlled by the network administrator. Users are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Today anyone person can become a hacker which downloading tools from the internet. Nowadays security is becoming vital in case of networking because everyday a new kind of attack is generated which leads to compromise our network and have security in network is decreasing because of increase in number of attacks. In this paper we have shown the comparison between different types of attacks in a network in a tabular form. Keywords—DOS, IP, Trojans, Phishing, Network I. INTRODUCTION The world is becoming more interconnected with the Internet and new technology by networking. In this security issue is that which to protect data which can be stored into computer. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access. Many network security threats today are spread over the Internet. The most common include: Viruses, worms, and Trojan horses, Eavesdropping, Data Modification, IP Spoofing, Password Based Attacks, Denial of service Attack, Man in the Middle Attack, Compromised Key Attack, Phishing, Trojans, Sniffer Attack. There are different kinds of attacks in the network security which can be discussed below. II. ATTACKS IN NETWORK SECURITY Two types of attacks in network security which are as following:- 1. Active Attack In active attack, the attacker tries to bypass or break information into secured systems. This attack can be done through worms, Trojan horses, or Viruses. Active attacks can be included to break protection of features and to modify the information. These attacks can be involved modification of data stream or creation of a false stream. Replay of this attack which can be used to capture of data unit and retransmission for an unauthorized effect. This attack can be easy to detect because attacks can alter a data. Result of this attack is that disclosure of data files or modification of data. Types of Active Attacks 1. 1 Denial of Service (DOS) attack A Denial of Service (DOS) attack is aimed that to preventing authorized on the network. The Denial of Service (DOS) attack is not aimed at to collecting a data. Aimed of denial of service is that to preventing authorized, legitimate users from using computers or the network normally. Denial of Service (DOS) attack can be used to sending the invalid data to the applications or network services until the server hangs and then simply crashes a system. Denial of Service is an attack when the system is to receiving too many requests but cannot return the communication with the requestors. 1.2 IP Spoofing IP Spoofing also known as IP address means that the address of the trusted computer is to gain the access of the other computers. The identity of the intruder is to be different by making detection which can be hidden and prevention of this attack is difficult. The intruder can be also use the valid address of the IP or to modify data. Administrators and Users can be used to protect themselves and their networks by implementing or installing the firewalls that can block the outgoing packets with the addresses of sources that can be differ from the IP addresses of the internal network or user’ computer. 1.3 Man-in-the-middle attacks Man-in-the-middle attack is the form of eavesdropping where the communication between two users is modified or monitored by unauthorized party. In the process, two original parties appear to normally communicate. Man-in- the-middle attack involves an attacker by inserting themselves which can be communicating between two parties. The attacker could also modify the messages in transit. This attack spoofs the opposite party and that parties believe and they are talking to the other expected party. Man-in-the-middle attacks are assuming your identity in order to read your message.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015] ISSN : 2454-1311 www.ijaems.com Page | 2 1.4 Masquerade To pretend to be someone else. This could be logging in with a different user account to gain extra privileges. For example, a user of a system steals the System Administrators username and password to be able to pretend that they are them. 2. Passive Attack A passive attack monitors the unencrypted traffic and then looks for clear-text passwords and other types of attacks can be used in sensitive information. Passive attacks include monitoring of unprotected communications, traffic analysis and capturing authentication information such as passwords. Result of passive attack is that to disclosure of data files or information to an attacker without the knowledge of the user. The goal of passive attack is to obtain the information that is being transmitted. Passive attack can be detect to difficult, because these type of attacks don’t alter data, can be prevented, rather than detected, use of encryption. Types of Passive Attacks 2.1 Eavesdropping Network sniffing or network Eavesdropping is a network layer attack which consisting of capturing packets from the network which can be transmitted by other computers and reading the data content in search of sensitive information like session tokens ,passwords, or any kind of confidential information. These attacks based on cryptography without strong communication services, your data can be read by others as it traverses the network. It is referred as snooping or sniffing when attacker is eavesdropping on your communication. 2.2 Traffic Analysis If information is encrypted, it will be more difficult to read the information being sent and received, but the attacker simply observers the information, and tries to make sense out of it; or to simply determine the identity and location of the two communicating parties. 2.3 Network Analysis To simply monitor the transmission between two parties and to capture information that is sent and received. The attacker does not intend to interrupt the service, or cause an effect, but to only read the information. 3. Other types of attacks 3.1 Viruses Viruses are self ‐replication programs that use files to infect and propagate. Once a file is opened, the virus will activate within the system. Viruses usually lead to some sort of data loss or system failure. There are numerous methods by which a virus can get into a system: • Through infected floppy disks • Through an e-mail attachment infected with the virus • Through downloading software infected with the virus 3.2 Phishing Attack In phishing attack the hacker creates a fake web site that looks like a popular site such as the SBI bank . The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site. 3.3 Sniffer attacks A sniffer is a device or an application that can monitor, read or capture network data exchanges and that read packets of network. A sniffer provides a full view of the data inside the packet, if the packets are not encrypted. Even encapsulated packets can be read unless and broken open then they are encrypted and the attacker does not have access to the key. A sniffer can analyze your network and gain information to cause is that to crash the system or to become corrupted. This attack 3.4 Password attacks Aim of Password based attacks is that at guessing the password for a system until the correct password is determined. Weakness of primary security is that which can be associated with password based access control is that all security is based on the user ID and password being utilized. The information of the password is simply sent in plain text or clear – no form of encryption is utilized. Remember that network attackers can obtain password information and user ID and then pose as authorized users and attack the corporate network. The attacker has the same rights as the real user, when an attacker finds a valid user account. We have selected following attacks and have compared the level how much harmful is that attack for our network:
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-1, Issue-6, Sept- 2015] ISSN : 2454-1311 www.ijaems.com Page | 2 1.4 Masquerade To pretend to be someone else. This could be logging in with a different user account to gain extra privileges. For example, a user of a system steals the System Administrators username and password to be able to pretend that they are them. 2. Passive Attack A passive attack monitors the unencrypted traffic and then looks for clear-text passwords and other types of attacks can be used in sensitive information. Passive attacks include monitoring of unprotected communications, traffic analysis and capturing authentication information such as passwords. Result of passive attack is that to disclosure of data files or information to an attacker without the knowledge of the user. The goal of passive attack is to obtain the information that is being transmitted. Passive attack can be detect to difficult, because these type of attacks don’t alter data, can be prevented, rather than detected, use of encryption. Types of Passive Attacks 2.1 Eavesdropping Network sniffing or network Eavesdropping is a network layer attack which consisting of capturing packets from the network which can be transmitted by other computers and reading the data content in search of sensitive information like session tokens ,passwords, or any kind of confidential information. These attacks based on cryptography without strong communication services, your data can be read by others as it traverses the network. It is referred as snooping or sniffing when attacker is eavesdropping on your communication. 2.2 Traffic Analysis If information is encrypted, it will be more difficult to read the information being sent and received, but the attacker simply observers the information, and tries to make sense out of it; or to simply determine the identity and location of the two communicating parties. 2.3 Network Analysis To simply monitor the transmission between two parties and to capture information that is sent and received. The attacker does not intend to interrupt the service, or cause an effect, but to only read the information. 3. Other types of attacks 3.1 Viruses Viruses are self ‐replication programs that use files to infect and propagate. Once a file is opened, the virus will activate within the system. Viruses usually lead to some sort of data loss or system failure. There are numerous methods by which a virus can get into a system: • Through infected floppy disks • Through an e-mail attachment infected with the virus • Through downloading software infected with the virus 3.2 Phishing Attack In phishing attack the hacker creates a fake web site that looks like a popular site such as the SBI bank . The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site. 3.3 Sniffer attacks A sniffer is a device or an application that can monitor, read or capture network data exchanges and that read packets of network. A sniffer provides a full view of the data inside the packet, if the packets are not encrypted. Even encapsulated packets can be read unless and broken open then they are encrypted and the attacker does not have access to the key. A sniffer can analyze your network and gain information to cause is that to crash the system or to become corrupted. This attack 3.4 Password attacks Aim of Password based attacks is that at guessing the password for a system until the correct password is determined. Weakness of primary security is that which can be associated with password based access control is that all security is based on the user ID and password being utilized. The information of the password is simply sent in plain text or clear – no form of encryption is utilized. Remember that network attackers can obtain password information and user ID and then pose as authorized users and attack the corporate network. The attacker has the same rights as the real user, when an attacker finds a valid user account. We have selected following attacks and have compared the level how much harmful is that attack for our network: