Sunday , 18 August 2019
roen

Considerations on Cyberattacks Perpetrated in the Context of Network Communications

Art. 01- Vol. 26 – No. 4 – 2016

Ion Alexandru Marinescu
ionut@ici.ro
Dragoş Nicolau
dragos@ici.ro
Lidia Bǎjenaru
lidia.bajenaru@ici.ro
National Institute for Research & Development in Informatics, ICI Bucharest

Abstract: Within the early years of the Internet Era, network communications used to enjoy a considerable level of operating safety. However, over the past several years, the advent of increasingly potent and frequent cyber attacks have succeeded to weaken and even erode this very favorable state of affairs. Cyber attacks are redoubtable enemies of network security and occur either- in the form of an extremely dense flow of requests released toward a server machine for the purpose of direct or indirect data-traffic obstruction or- in the form of stealth insertion of malicious program code meant to be interpreted/executed in full confidence by the targeted application (client side-type, client side-type infected via server-side, server-side) and thus to enable the theft or the partial or total destruction of valuable pieces of data. The present paper is designed to describe the functional principles of the most widely  spread remote-cyber attacks and also to present the defensive measures that must be applied to achieve the goal of preventing/annihilating cyber aggressions.

Keywords: network communications, cyber-attack, server, malicious injection.

View full article