Left Quote    If at first you don't succeed, redefine success.
- Anon.    
Right Quote
[login] | [Register]

Computer Attacks

by: Anon.
Page: 2 of 5
(View All)

Classification of Computer Attacks

When we say "computer attack," we mean programs run by people to gain unauthorized control over a computer. These attacks take a variety of forms but generally fall in the following categories:

  1. Remote Penetration: Programs that go out on the Internet (or network) and gain unauthorized control of a computer.
  2. Local Penetration: Programs that gain unauthorized access to the computer on which they are run.
  3. Remote Denial of Service: Programs that go out on the Internet (or network) and shut down another computer or a service provided by that computer.
  4. Local Denial of Service: Programs that shut down the computer on which they are run.
  5. Network Scanners: Programs that map out a network to figure out which computers and services are available to be exploited
  6. Vulnerability Scanners: Programs that scour the Internet looking for computers vulnerable to a particular type of attack.
  7. Password Crackers: Programs that discover easy-to-guess passwords in encrypted password files. Computers can now guess passwords so quickly that many seemingly complex passwords can be guessed.
  8. Sniffers: Programs that listen to network traffic. Often these programs have features to automatically extract usernames, passwords, or credit card information.


Statistical Sampling of Publicly Available Computer Attacks In 1998, NIST categorized and analyzed 237 computer attacks that were published on the Internet out of an estimated 400 published attacks. This sample yielded the following statistics:

  • Statistic: 29% of attacks can launch from Windows hosts Lesson: One does not need to understand Unix to be dangerous anymore. We are in an era of "point and click" attacks.
  • Statistic: 20% of attacks are able to remotely penetrate network elements (e.g., routers, switches, hosts, printers, and firewalls) Lesson: Attacks that give remote users access to hosts are not rare.
  • Statistic: 3% of the attacks enable Web sites to attack those who visited the site. Lesson: Surfing the Web is not a risk-free activity.
  • Statistic: 4% of attacks scan the Internet for vulnerable hosts Lesson: Automated scanning attack tools, which find easily compromised hosts, abound. System administrators, with management concurrence or with professional assistance, should scan their own systems regularly before someone else does.
  • Statistic: 5% of attacks are effective against routers and firewalls. Lesson: The Internet infrastructure components themselves are vulnerable to attack. (To the computer industry's credit, most attacks were denial of service and scanning and only a few were penetration attacks.) The Most Popular Attacks on the Internet In March 1999, the most popular attacks (or vulnerable applications) found by NIST were Sendmail, ICQ, Smurf, Teardrop, IMAP, Back Orifice, Netbus, WinNuke, and Nmap.

These are discussed on the next page -->

1  |  2  |  3  |  4  |  5  |  
Next »

No Comments for this page.

You Must be logged in or a member to comment.

Tutorial Stats

Tutorial Stats

0 Total Comments
0 Rating of 5 ( Votes)


Tutorial Options

· Login to Rate This Article
· Login to Post a Comment
· Read more by this author
Digg This Article! Bookmark This Article Reddit: Bookmark This Article BlinkList: Blink This Article! YahooMyWeb BlogMarks: Add This Mark! Furl: Save This Article Spurl: Mark This Article



· Anonymity via Proxy
· Your Browser Cookies
· Controlling your JavaScript
· Protect Against Spyware

"" Copyright © 2002-2018; All rights lefted, all lefts righted.
Privacy Policy  |  Internet Rank