Internet security attacks at the basic levels
- 1 April 1998
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 32 (2) , 4-15
- https://doi.org/10.1145/506133.506136
Abstract
The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the rest of the world. Good news and bad news!. Over the last decade, the Internet has been subject to widespread security attacks. Besides the classical terms, new ones had to be found in order to designate a large collection of threats: Worms, break-ins, hackers, crackers, hijacking, phrackers, spoofing, man-in-the-middle, password-sniffing, denial-of-service, and so on.Since the Internet was born of academic efforts to share information, it never strove for high security measures. In fact in some of its components, security was consciously traded for easiness in sharing. Although the advent of electronic commerce has pushed for "real security" in the Internet, there is yet a huge amount of users (including scientists) very vulnerable to attacks, mostly because they are not aware of the nature (and ease) of the attacks and still believe that a "good" password is all they need to be concerned about.We wrote this paper aiming for a better understanding of the subject. In the paper we report some of the major actual known attacks. Besides the description of each attack (the what ), we also discuss the way they are carried on (the how ) and, when possible, the related means of prevention, detection and/or defense.Keywords
This publication has 5 references indexed in Scilit:
- TCP SYN flooding and IP spoofing attacksNetwork Security, 1996
- The S/KEY One-Time Password SystemPublished by RFC Editor ,1995
- Pretty good privacyComputer Fraud & Security Bulletin, 1994
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,1993
- Quantum CryptographyScientific American, 1992