2016
DOI: 10.5120/ijca2016909811
|View full text |Cite
|
Sign up to set email alerts
|

A Detailed Survey and Classification of Commonly Recurring Cyber Attacks

Abstract: Although the computing devices in today's era can be compromised in a variety of ways, this research paper delves deep into different types of cyber attacks that strip out security from the innocent clients. The impact of these attacks depend more on the broad spectrum of opportunities that a novice user serves to an attacker unknowingly. Though a client sometimes has minimum power to withstand the technical prowess of a skilled attacker, still the probability of such attacks can be nullified by reducing the v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Once again, different methods exist for a Brute Force approach, such as a statistical analysis of the most common and recurring characters dependant on the password difficulty. This categorisation is presented in [30] to classify the most common recurring cyber attacks. The use of DoS to categorise attacks is quite common.…”
Section: Attack Typementioning
confidence: 99%
See 1 more Smart Citation
“…Once again, different methods exist for a Brute Force approach, such as a statistical analysis of the most common and recurring characters dependant on the password difficulty. This categorisation is presented in [30] to classify the most common recurring cyber attacks. The use of DoS to categorise attacks is quite common.…”
Section: Attack Typementioning
confidence: 99%
“…Attack Severity Six threat levels: Localised, Moderate, Substantial, Significant, Highly Significant and National Cyber Emergency [15] Access Type Physical, Cyber [16] Attack Type DoS, Probing, R2L, U2R [19][20][21][22][23][24][25] DoS, MitM, Brute Force [26,30] DoS, Replay, Deception [35,36] Active Eavesdropping, Scanning, Probing [44] Physical, Network, Software, Encryption…”
Section: Categorisation Approach Referencesmentioning
confidence: 99%