Types of Attacks (original) (raw)
Related papers
Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities
Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today's Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attack can easily drain the computing and communication resources of its victim within a short period of time. In this paper, DDoS attacks based on the protocols vulnerabilities in the TCP/IP model, their impact on available resources viz CPU,memory,buffer space is investigated. This paper aims to provide a better understanding of the existing tools,methods and comparative analysis of them,and defense mechanisms.
Security Vulnerabilities & Countermeasures In TCP/IP Layers
Mwami Mugala, 2014
The TCP/IP protocol suite was created as an internetworking solution with little or no regard to security aspects. The development of TCP/IP protocol suite was focused on the creating a communication protocol standard that can interoperate between different hardware devices and software independent. Other major goals included; failure recovery and the ability to handle high error rates, efficient protocol with low overhead, routable data and the ability to add new networks to an already existing network without disrupting the existing network (TCP/IP Foundations, Sybex, San Francisco and London. Andrew G Blank. 2004.). Its main emphasis was providing a suite Security was not given priority in the creation of this protocol suite. Hence, by default, TCP/IP has security flaws at both the protocol level and implementation. The major types of possible attacks that are highlighted in ths paper are denial of service.
Identifying and Scoring Vulnerability in SCADA Environments
—Supervisory Control and Data Acquisition (SCADA) systems form a critical component to industries such as national power grids, manufacturing automation, nuclear power production and more. By interacting with control machines and providing real-time support to monitor, gather, and record data, SCADA systems show major impact in industrial environments. Along with the uncountable benefits of SCADA systems, inconceivable risks have raised. Moreover, SCADA operators, production staff and sometimes systems experts have no or little knowledge when applying security due diligence. In this paper, we systematically review SCADA security based on different aspects (i.e. SCADA components, vulnerability, severity, impact, etc.). Our goal is to provide an all-inclusive reference for future SCADA users and researchers. We also use a time-based heuristic approach to evaluate vulnerabilities and show the importance of the evaluation. We aim to establish a fundamental level of security due diligence to ensure SCADA risks are well-comprehended and managed.