CONSIDERATIONS ON CYBERATTACKS PERPETRATED
IN THE CONTEXT OF NETWORK COMMUNICATIONS
Abstract: Within the early years of the Internet Era, network communications used to enjoy a considerable level of operating safety. However, over the past several years, the advent of increasingly potent and frequent cyber attacks have succeeded to weaken and even erode this very favorable state of affairs. Cyber attacks are redoubtable enemies of network security and occur either- in the form of an extremely dense flow of requests released toward a server machine for the purpose of direct or indirect data-traffic obstruction or- in the form of stealth insertion of malicious program code meant to be interpreted/executed in full confidence by the targeted application (client side-type, client side-type infected via server-side, server-side) and thus to enable the theft or the partial or total destruction of valuable pieces of data.
The present paper is designed to describe the functional principles of the most widely spread remote-cyber attacks and also to present the defensive measures that must be applied to achieve the goal of preventing/annihilating cyber aggressions.
Keywords: network communications, cyber-attack, server, malicious injection.
- KALIN, JACOB ş.a.: A comprehensive tutorial on cross-site scripting, http://excess-xss.com/ ;
- SANDERS, CHRIS: Understanding Man-in-the-Middle Attacks, 2010, http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/ Understanding-Man-in-the-Middle-Attacks-ARP-Part1.html
- TELINOV, DIMITRI: Atacuri SQL Injection, http://www.security.ase.md/publ/ro/pubro32/ ;
- WALKER, SHAUN & SANTRY, PATRICK J. ş.a.: Professional DotNetNuke ASP.NET”-2005.
This work is licensed under a Creative Commons Attribution 4.0 International License.