Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet17/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   ...   13   14   15   16   17   18   19   20   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

2.49 SYN flooding
:
Common DoS attacks use SYN 
to flood servers. It is based on the Transmission 
Control Protocol (TCP) handshake process that 
overflows the normal three-way handshake using 
SYN and ACK packets between hosts. Attackers 
never send the ACK part and otherwise they keep 
sending multiple SYN packets to get several half-
opened connections causing a system crash. 
2.50 Transitive access
:
This access involves a 
trusted relationship within a network that can be 
exploited to attack core systems. Client-side attacks 
use transitive relationships whenever an attacker 
cannot aim a direct cyberattack. 
2.51 Typo squatting
:
This is a form of 
cybersquatting that reroutes users to malicious 
websites. Active domain names with typographical 
errors are created, registered as valid URLs and 
then uploaded as alternate websites to infect users 
with malware.
2.52 URL hijacking
:
This attack is also known as 
Man-in-the-Browser attack. It triggers a Trojan to 
hijack the communication between the browser and 
the libraries. The extension files from the Trojan 
convert the Document Object Model (DOM) 
interface and modify the user values.
2.53 Vishing
:
This attack uses Voice over Internet 
Protocol (VoIP) or a phone system calls to trick 
users to give personal information in a similar way 
to phishing attacks. Attackers can spoof caller IDs 
to masquerade a phone call within a company. 
Personal information is at risk if the user provides 
the required information to validate some kind of 
financial transaction. 


172 
R. Sabillon et. al / International Journal of Computer Networks and Communications Security, 4 (6), June 2016 

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish