Internet security attacks at the basic levels

  • Authors:
  • Marco de Vivo;Gabriela O. de Vivo;Germinal Isern

  • Affiliations:
  • Apartado Postal 68274, Caracas, Venezuela;-;-

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 1998

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the rest of the world. Good news and bad news!. Over the last decade, the Internet has been subject to widespread security attacks. Besides the classical terms, new ones had to be found in order to designate a large collection of threats: Worms, break-ins, hackers, crackers, hijacking, phrackers, spoofing, man-in-the-middle, password-sniffing, denial-of-service, and so on.Since the Internet was born of academic efforts to share information, it never strove for high security measures. In fact in some of its components, security was consciously traded for easiness in sharing. Although the advent of electronic commerce has pushed for "real security" in the Internet, there is yet a huge amount of users (including scientists) very vulnerable to attacks, mostly because they are not aware of the nature (and ease) of the attacks and still believe that a "good" password is all they need to be concerned about.We wrote this paper aiming for a better understanding of the subject. In the paper we report some of the major actual known attacks. Besides the description of each attack (the what), we also discuss the way they are carried on (the how) and, when possible, the related means of prevention, detection and/or defense.