National Institute for Research & Development of Informatics – ICI Bucharest
Abstract: At the beginning of the Internet Era, communications did not pose any threat either to servers or users. This is mainly explained by the fact that the information was conveyed in one sense, from the server to the user, constituting a “read-only” flow. For many years now, however, this is no longer the case, because computer attacks have emmerged. Basically, these consist either in issuing a very high stream of requests to a victim server machine, or in malicious code injection in the hope that the program to which it is destined (client application infected by server or server application ) will execute in good faith, thereby stealing or ruining information. The evolution from the original Internet-type applications to the Web type (those applications that allow the user to send data to the server to be processed) opened new opportunities for cyber-criminals to send malicious code to the server side of applications. In this paper we present the principle of running an application that executes remote attacks.
Keywords: network communications, cyber-attack, server, malicious injection.