Art. 05 – Vol. 27 – No. 4 – 2017

Considerations on the Functional Principle of a
Cybernetic Remote Attack

Dragoş NICOLAU
dragos@ici.ro
National Institute for Research & Development of Informatics – ICI Bucharest

Abstract: At the beginning of the Internet Era, communications did not pose any threat either to servers or users. This is mainly explained by the fact that the information was conveyed in one sense, from the server to the user, constituting a “read-only” flow. For many years now, however, this is no longer the case, because computer attacks have emmerged. Basically, these consist either in issuing a very high stream of requests to a victim server machine, or in malicious code injection in the hope that the program to which it is destined (client application infected by server or server application ) will execute in good faith, thereby stealing or ruining information. The evolution from the original Internet-type applications to the Web type (those applications that allow the user to send data to the server to be processed) opened new opportunities for cyber-criminals to send malicious code to the server side of applications. In this paper we present the principle of running an application that executes remote attacks.

Keywords: network communications, cyber-attack, server, malicious injection.

View full text

CITE THIS PAPER AS:
Dragoş NICOLAU, Considerations on the Functional Principle of a Cybernetic Remote Attack, Romanian Journal of Information Technology and Automatic Control, ISSN 1220-1758, vol. 27(4), pp. 47-56, 2017.

REFERENCES

  1. *** – Bisk Technolgy Center – 10 Companies Affected by Cyber Attacks; https://www.villanovau.com/resources/iss/companies-affected-by-cyber-attacks/#.WBx_uvQvvZ_
  2. *** – Cyber criminals increase attacks on remote working technologies; http://continuitycentral.com/index.php/news/technology/2363-cyber-criminals-increase-attacks-on-remote-working-technologies, oct 2017
  3. *** – OpenVPN Technologies Inc – Why Small Businesses are a BIG target for Cyber Criminals; https://www.privatetunnel.com/ home/why-small-businesses-are-a-big-target-for-cyber-criminals
  4. *** – Strategia de securitate cibernetică a României; https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/StrategiaDeSecuritateCiberneticaARomaniei.pdf
  5. *** – US Dept. of Homeland Security – Cybersecurity Overview; https://www.dhs.gov/cybersecurity-overview
  6. FREED, A. M.: Another Payment Card Processor Hacked, 2009; http://information-security-resources.com/ 2009/02/ 14/another-payment-card-processor-hacked
  7. GRIMES, R.: Five reasons Internet crime is worse than ever; http://www.infoworld.com/article/2608631/security/5-reasons-internet-crime-is-worse-than-ever.html
  8. LOW, S.: Smart Grid Research: Potential Cyber Threats and Mitigation; https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/ reports/critical-infrastructures-west-hemisphere.pdf
  9. MARINESCU, I. A.; NICOLAU D.; BǍJENARU, L.: Consideraţii asupra atacurilor cibernetice, executate în contextul comunicaţiilor prin reţea; RRIA, Art. 01, Vol. 26, Nr. 4, 2016.
  10. MERCER, E.: Causes of Cyber Crime; http://techin.oureverydaylife.com/causes-cyber-crime-1846.html
  11. POPA, S. E.: Securitatea sistemelor informatice, note de curs şi aplicaţii pentru studenţii Facultăţii de Inginerie, Universitatea din Bacău

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.