{"title":"Analysis of Network Communication Attacks","authors":"S. Kamal, B. Issac","doi":"10.1109/SCORED.2007.4451370","DOIUrl":null,"url":null,"abstract":"Over the last decade, computer networks have been subject to widespread security attacks. Some are spoofing attacks, Denial of service (DoS) attacks and its various forms (like ping attacks, smurfing etc), password sniffing, packet capturing along with traffic analysis and other wireless key cracking attacks. Many of these attacks steal someone's identity and use it for exploiting the victim or others by masquerading or forgery, made the network or computer system inoperable by interrupting normal services, created a back door for re-visits etc. In this paper we analyze some of these attacks and evaluate its effectiveness, concluding with some security recommendations.","PeriodicalId":443652,"journal":{"name":"2007 5th Student Conference on Research and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 5th Student Conference on Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCORED.2007.4451370","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Over the last decade, computer networks have been subject to widespread security attacks. Some are spoofing attacks, Denial of service (DoS) attacks and its various forms (like ping attacks, smurfing etc), password sniffing, packet capturing along with traffic analysis and other wireless key cracking attacks. Many of these attacks steal someone's identity and use it for exploiting the victim or others by masquerading or forgery, made the network or computer system inoperable by interrupting normal services, created a back door for re-visits etc. In this paper we analyze some of these attacks and evaluate its effectiveness, concluding with some security recommendations.