New attack models
Course:- Computer Network Security
Length: 20
Reference No.:- EM13156

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

The computer networks are based on free circulation of the information; they are built so to facilitate the users' access and to be very wide open to the information process. Attacks pose a serious security threat to a network environment. Once with the networks' connection to Internet or to other external computer networks, the aggression risks grow very much.

This paper constructed on the following bricks:-

1.      Abstract

2.      Introduction to New Attack Models

3.      What is an Attack?

4.      Purpose of launching attacks

5.      Types of Attacks

6.      Phishing

7.      Zombie computers and Bonnets

a.       Spyware

b.      Adware

c.       E- mail Spam

d.      Click Fraud

e.       Fast Flux

f.       Scare ware

8.      Cross Site Request Forgery

9.      Hardware Loss and Residual Data Fragments

10.  Application Layer Attack

a.       FTP related attacks

b.      SMTP related attacks

11.  Distributed Denial of service

a.       Bandwidth Depletion Attack

b.      Resource Depletion Attack

12.  Password Guessing Attacks

a.       Brute-force Attacks.

b.      Dictionary Attacks.

13.  Advanced Persistent Threats

14.  Unauthorized Access

a.       Internal Hacking

b.      External Hacking

15.  Viruses and Worms

16.  Trojan Horses

17.  Network Eavesdropping

18.  Prevention Methods

19.  Appendix

20.  References

In this paper we intend to present few types of network attacks which are common and pose a serious threat to the network systems along with certain measures or steps which should be necessarily taken in order to keep the networking computers secure from vulnerable attacks or intrusions and helps in securing the information.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.
Using the RSA public key (e, n) = (1612093, 97059503) and the plain message/signature pair [m, s] = [12345678, 41009275] create another working signature and message pair wi
Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available
Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All addition
What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?
list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?
A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies t
After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Comp