StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Types of Network Attacks - Research Paper Example

Cite this document
Summary
This research paper aims to identify the types of network attacks and discuss them with the help of research so that it becomes clear which types are prevalent and what precautionary measures need to be taken by the government and public as a defense mechanism. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Types of Network Attacks
Read Text Preview

Extract of sample "Types of Network Attacks"

?Types of network attacks: There is a variety of network attacks reported by researchers and information assurance professionals which keep targetingthe government and private industry in a staggering number. It is a great concern of both the government and private industry to get rid of them by using the defense mechanisms identified by information assurance professionals in the past but significant research is still in continuation on this particular subject. It is reported that the number of attacks has doubled by two times since the introduction of World Wide Web due to which some say that the number of network attacks has become unprecedented now and the faster effective defense actions are taken against them, the better. The National Cyber Alert System for the US government and private sectors identified in recent past that all types of network attacks utilize security vulnerabilities (Yang, 1997) and nearly half of all the security threats from the Internet go unreported. This research paper aims to identify the types of network attacks and discuss them with the help of research so that it becomes clear which types are prevalent and what precautionary measures need to be taken by the government and public as a defense mechanism. There exists no sound or authorized way to accurately monitor or track the network based attacks which are so high profile that to keep a definite record of them is not possible (Anderson, 2008, p. 367) and which is why the information assurance professionals associated with the US-CERT (Computer Emergence Readiness Team) resolved to stop monitoring the quantity of network attacks as there was really no way to decide on a definite number nor the cost of a cyber attack over long term is reportable (Julian, cited in Headlines, 2011). This does not mean that the responsible people have given up on coordinating the appropriate response to cybersecurity and no further efforts are made to raise awareness about the issue of security threats and types of network attacks. In a very recent report, a gigantic rise in attacks on social networks is identified by the security breaches involving hackers seeking to mutilate personal data (Dembosky, 2012). So, the focus has only shifted from keeping a record of the number of security threats to identifying the rise in attacks, providing computer security vulnerabilities and identifying the necessary actions for suppressing the network attacks both for the government sector and personal computer users. It is increasingly important for the information assurance professionals and network administrators to acknowledge the nature of potential attacks on computer security so that it becomes easier afterwards to protect the network against such attacks. Spoofing is one such network attack which creates problems by causing a host or application to imitate the actions of another (The Linux Documentation Project, 2002). This is done by tracking IP addresses in network patches by the attacker who conventionally mimics another innocent host. After identifying the IP address by IP Address Spoofing, the attacker next proceeds to modifying or deleting important data (Microsoft TechNet, 2012). Following IP addresses means tracking or guessing TCP sequence number for example as in the case when a TCP connection from another host is tried to be mimicked by the attacker. This is why security vulnerabilities are created by the US-CERT to defend against such natured network attacks. The authenticity of various datagrams and commands is also advised to be verified by the teams responsible for detecting network attacks. This is identified as a very important step for protection against network attacks like spoofing. The attackers also try taking advantage of the element of predictability which is why it is advised to incorporate unpredictability into connection control systems so that TCP sequence numbers and myriad port addresses for example could not be tracked or mimicked through spoofing. Source addresses are also taken advantage of in spoofing due to which research stresses on “preventing datagram routing with invalid source addresses” (The Linux Documentation Project, 2002). Eavesdropping is another type of network attack in which the attacker listens in or interprets the information after gaining access to the IP address or data paths in the network and tracking one or more security vulnerabilities (Microsoft TechNet, 2012). Most of the network communications occur in an unsecured format and the attacker in case of eavesdropping tries to interpret this unsecured communication by listening in without any authority. The term of snooping is also used when an attacker listens in to the communication. Many network attacks happen around the TCP/IP (Transmission Control Protocol) which is the most commonly used communication protocol (Yang, 1997). One defensive strategy against eavesdropping can be utilized by using very strong encryption services based on cryptography so that personal data could not be read by others. “Mac OS X and iOS provide a number of different APIs (Application Programming Interface) for encryption and decryption” (Apple Inc., 2012). Data modification is also a network attack which refers to the alteration of the data after it is interpreted by the eavesdropper. Gaining information about the sender or receiver of the data is not important as the attackers can cause changes to it without knowing that. Loss up to millions of dollars can be faced if important messages or communications are infiltrated in this way and modified in transit. The ability to monitor the network, target security vulnerabilities, and hacking the IP address form together one of the biggest security problems faced by administrators in an enterprise. Though not all messages are confidential, still no wants them to be modified. “For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified” (Microsoft TechNet, 2012). Summing up, this much becomes clear from the above discussion that network security is a big issue and a variety of attacks pose serious threat to the US government and nation as the number of system targeted by one of such attacks ranges from hundreds to thousands. It is no doubt that cyber crime on social networks like Twitter and Facebook is turning into an entire industry as criminals even hire more people to generate more traffic and infiltrate more communications and messages. There are problems in various features of networks like protocol organization and network architecture which make them very vulnerable to the hackers so attacks should be avoided by adopting more effective defensive strategies on these scores. References: Anderson, R. (2008). Security Engineering – A Guide to Building Dependable Distributed Systems. (2nd ed.). John Wiley & Sons. Apple Inc. (2012, January 9). Encrypting Data. Retrieved from http://developer.apple.com/library/mac/#documentation/security/Conceptual/cryptoservices/GeneralPurposeCrypto/GeneralPurposeCrypto.html Dembosky, A. (2012, June 7). Hackers escalate attacks on social networks. Tech Hub. Retrieved from http://www.ft.com/cms/s/0/2c348bba-b0c5-11e1-a2a6-00144feabdc0.html#axzz21LlmElga Headlines. (2011, August 18). Top Ten Most Expensive Network Attacks in History. infosec ISLAND. Retrieved from http://www.infosecisland.com/blogview/15966-Top-Ten-Most-Expensive-Network-Attacks-in-History.html Microsoft TechNet. (2012). Common Types of Network Attacks. Retrieved from http://technet.microsoft.com/en-us/library/cc959354.aspx The Linux Documentation Project. (2002, June 13). Introduction to Network Attacks. SecurityProNews. Retrieved from http://www.securitypronews.com/it/security/spn-23-20020613IntroductionToNetworkAttacks.html Yang, G. (1997, November 18). Introduction to TCP/IP Network Attacks. Retrieved from http://seclab.cs.sunysb.edu/sekar/papers/netattacks.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Types of Network Attacks Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Types of Network Attacks Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1454942-examples-of-network-ttacks
(Types of Network Attacks Research Paper Example | Topics and Well Written Essays - 1000 Words)
Types of Network Attacks Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1454942-examples-of-network-ttacks.
“Types of Network Attacks Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1454942-examples-of-network-ttacks.
  • Cited: 3 times

CHECK THESE SAMPLES OF Types of Network Attacks

Network Security as a Business Benefit

ole of network Security: How does it protects youIt performs the key role as the name indicates as quoted by (Bragg et al) : • Unauthorized access: It secures the network and does not allow any unauthorized access.... In organizations, enterprises, and other types of institutions Network security is involved so as to maintain the confidentiality of their data (King, 10).... The paper "network Security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation....
6 Pages (1500 words) Case Study

Week 2 CYB632

First, there is the Computer sciences and information technology Assignment Types of Network Attacks: IP Spoofing There are many different types of attacks that can be used by attackers to analyze networks and obtain information about that network.... In The Practice of network Security: Deployment Strategies for Production Environments.... There are two types of this attack.... There are two types of this attack.... Network Security: Understanding types of Attacks....
2 Pages (500 words) Assignment

Network Security-Intrusion Detection System

Also various types of intrusion detection systems, mainly the Host and Network-based intrusion detection system covered in this paper.... nbsp; The Intrusion Detection systems are developed in response to these major attacks on various sites and networks.... There has been a number of cases reported when major attacks on various sites, computer systems, and networks have encountered.... Some of the recent major attacks cases are attacks on the Pentagon, the White House, NATO, the U....
16 Pages (4000 words) Essay

Aspects of Network Security Management

This essay "Network Security" presents a comprehensive overview and analysis of some of the main aspects of network security as well as its management.... It is assessed that more layers of network security result in a more secure network as well as the working environment (Laudon & Laudon, 1999; Ray, 2004; Kaminsky, 2010).... his paper will present a comprehensive overview and analysis of some of the main aspects of network security as well as its management....
6 Pages (1500 words) Essay

Analysis of Hacking Attacks

The paper "Analysis of Hacking attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station.... omputer attackers can generally be classified into three major types, namely: (a) unsophisticated ''script kiddies''; these carry out the junk of the cyber intrusions, (b) crackers; these carry out cyberattacks for self-interest or malicious reasons, and (c) hackers; these are In more smart attackers who are guided more by their curiosity rather than being malicious....
24 Pages (6000 words) Coursework

Types of Hacking

The paper "types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... The term “hacker” is presently too broad to represent the specifics of the different sorts of computer-related attacks.... In order to incorporate all of the different computer attacks in a way that facilitates understanding it will be necessary to identify specific sub-categories that will fall under the umbrella of “hackers” (Howard, 1997)....
24 Pages (6000 words) Coursework

Denial of Service Attacks

The paper 'Denial of Service attacks' presents the billions of computers that exist globally are all connected through the internet.... hellip; The computer interconnectivity, which is dependent, on the global internet, however, makes its components an easy target for attackers who try to deplete their resources and launch denial of service attacks against them.... The DoS attacks can be described as a single group or person's spiteful attack to cause the site....
8 Pages (2000 words) Term Paper

Network Time Protocol

This coursework "network Time Protocol" describes the analysis of network Time Protocol (NTP).... However, it is highly uneconomical and impractical for every computer in a network to be fitted with these receivers.... Therefore, computers known as primary time servers are always outfitted with the receivers then use protocols such as NTP to carry out the synchronization of clock times of computers that are connected to a network....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us