CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Detailed Survey and Classification of Commonly Recurring Cyber Attacks

by Jaideep Singh, Simarpreet Kaur, Gurminder Kaur, Goldendeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 10
Year of Publication: 2016
Authors: Jaideep Singh, Simarpreet Kaur, Gurminder Kaur, Goldendeep Kaur
10.5120/ijca2016909811

Jaideep Singh, Simarpreet Kaur, Gurminder Kaur, Goldendeep Kaur . A Detailed Survey and Classification of Commonly Recurring Cyber Attacks. International Journal of Computer Applications. 141, 10 ( May 2016), 15-19. DOI=10.5120/ijca2016909811

@article{ 10.5120/ijca2016909811,
author = { Jaideep Singh, Simarpreet Kaur, Gurminder Kaur, Goldendeep Kaur },
title = { A Detailed Survey and Classification of Commonly Recurring Cyber Attacks },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 10 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number10/24819-2016909811/ },
doi = { 10.5120/ijca2016909811 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:08.447938+05:30
%A Jaideep Singh
%A Simarpreet Kaur
%A Gurminder Kaur
%A Goldendeep Kaur
%T A Detailed Survey and Classification of Commonly Recurring Cyber Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 10
%P 15-19
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Although the computing devices in today's era can be compromised in a variety of ways, this research paper delves deep into different types of cyber attacks that strip out security from the innocent clients. The impact of these attacks depend more on the broad spectrum of opportunities that a novice user serves to an attacker unknowingly. Though a client sometimes has minimum power to withstand the technical prowess of a skilled attacker, still the probability of such attacks can be nullified by reducing the vulnerabilities of a particular computing system. Thus conscious risk management strategies need to be implemented to save organizations and billions of users across the world surfing the web wirelessly. The paper starts with a brief introduction about various wireless attacks that are frequently carried out in a local area network and their classifications. The research presents several schemes for detecting, mitigating and preventing such type of precarious attacks. Role of user awareness in diminishing the threatening effects of such assaults has been specially taken into consideration. The important features and limitations of the already reported methods against protection of such attacks have been examined.

References
  1. M. Uma and G. Padmavathi, “A Survey on Various Cyber Attacks and Their Classification”, in the proceedings of International Journal of Network Security, Vol. 15, p.p. 390-396 (2013)
  2. Monika Sachdeva, Gurvinder Singh and KrishanKumar, “Deployment of Distributed Defence against DDoS Attacks in ISP Domain”, in the proceedings of International journal of Computer Applications, Vol. 15,p.p. 25-31(2011)
  3. Carlisle adams and Guy-Vincent Jourdan, “Lightweight protection against Brute Force Login attacks on Web Applications”, in the proceedings of Privacy Security and Trust (PST), 2010 Eighth Annual International Conference,p.p 181-188 (2010)
  4. Parveen Sadotra “Hashing technique-SQL injection attack detection and prevention”, in the proceedings of International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3 , p.p 4356-4365 (2015)
  5. Predrag Tasevski ,”Password Attacks And Generating Strategies”
  6. Retrievedfrom:http://www.trendmicro.co.in/vinfo/in/security/news/cybercrime-and-digital-threats/using-8-backdoor-techniques-attackers-steal-company-data
  7. Dove Chiu,Shih-Hao Weng,and Joseph Chiu,”Backdoor use in Trageted Attacks”
  8. Jaideep Singh and Vinit Grewal, “A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks”, in the proceedings of International Journal of Computer Applications, Vol. 116, p.p 25-28 (2015)
  9. C. Barry, L. Lee, and M. Rewers, International Cyber Technology and National Security Policy, National Defense University, June 2009.
  10. M. J. Ranum, Internet Attacks, pp.1-37, 1997.
  11. GFI Software, GFI Targeted Cyber Attacks http://www.gfi.com
  12. Retrieved from: http://thenextweb.com/apple/2016/02/09/huge-number-of-mac-apps-are-vulnerable-to-man-in-the-middle-attacks/#gref
  13. Retrieved from:http://www.dqindia.com/india-most-vulnerable-cyber-attacks/
  14. Retrieved from: http://www.scientificamerican.com/article/the-most-vulne rable-ransomware-targets-are-the-institutions-we-rely-on-most/
  15. Retrieved from: http://www.learninghowtohack.com/password-hacking-5-attack-types-hybrid/
  16. Marco Antônio Carnut and João J. C. Gondim, "ARP spoofing detection on switched ethernet networks: a feasibility study," 5th Symposium on Security in Informatics held at Brazilian Air Force Technology Institute, November 2003
  17. G. Sowmya and A. Naveen Kumar,” Brute force attack – blocking techniques”,in the proceedings of international journal of Engineering and Computer Sciences, Volume2 Issue 8 August, 2013 Page No. 2541-2543.
  18. Retrieved From:https://www.recordedfuture.com/cyber-threat-landscape-basics/
  19. Retrieved from: http://internetofthingsagenda.techtarget.com/definition/man-in-the-middle-attack-MitM
  20. Wei Chen,Dit-Yan Yeung, “Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing”, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 38, 2006.
  21. Changhua Sun. Jindou Fan and Bin Liu, “A Robust Scheme to Detect SYN Flooding Attacks”, Sec. Inter. Conference on Communications and Networking,China , pp. 397-401,2007.
  22. Jaideep Singh, Goldendeep Kaur, Dr. Jyoteesh Malhotra, “A Comprehensive Survey of Current Trends and Challenges to mitigate ARP attacks”, In proceedings of 1st International Conference on Electrical, Electronics, Signals and Optimization, ISBN: 978-1-4799-7678-2, 2015 IEEE.
  23. “ARP-Guard,” (accessed 28-July-2013). [Online]. Available http://www.arp-guard.com.
  24. Zouheir Trabelsi and Khaled Shuaib. Spoofed ARP Packets Detection in Switched LAN Networks. J. Filipe and M.S. Obaidat (Eds.): ICETE 2013, CCIS 9, pp. 81– 91
  25. M. Barnaba, “anticap”, (accessed 17 April 2013) Online. Available: http://www.antifork.org/anticap.
  26. V. Goyal and V. Abraham “ An efficient Solution to the ARP cache poisoning problem”, in Proceedings of 10th Australasian Conference on Information Security and Privacy, Jul 2013, pp 40-51.
  27. I.Teterin, Antidote, SecurityFocus, http://online.securityfocus.com/archive/1/299929, last accessed, Apr. 2012.
  28. M. Gouda and C.-T. Huang. A secure address resolution protocol. Computer Networks, 41(1):57–71,Jan.2012
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Assaults User Awareness Risk Management Local Area Networks .