TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Computer Networks
PGP: Pretty Good Privacy
Internet Firewalls and Network Security
Internet Firewalls and Network Security
Operating System Concepts, 4th Ed.
Operating System Concepts, 4th Ed.
A review of port scanning techniques
ACM SIGCOMM Computer Communication Review
Internet vulnerabilities related to TCP/IP and T/TCP
ACM SIGCOMM Computer Communication Review
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
A secure address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Privacy-Enhancing e-Business Model Based on Infomediaries
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
IEEE/ACM Transactions on Networking (TON)
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A novel approach for protection of confidential web contents
ECC'11 Proceedings of the 5th European conference on European computing conference
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.00 |
The Internet put the rest of the world at the reach of our computers. In the same way it also made our computers reachable by the rest of the world. Good news and bad news!. Over the last decade, the Internet has been subject to widespread security attacks. Besides the classical terms, new ones had to be found in order to designate a large collection of threats: Worms, break-ins, hackers, crackers, hijacking, phrackers, spoofing, man-in-the-middle, password-sniffing, denial-of-service, and so on.Since the Internet was born of academic efforts to share information, it never strove for high security measures. In fact in some of its components, security was consciously traded for easiness in sharing. Although the advent of electronic commerce has pushed for "real security" in the Internet, there is yet a huge amount of users (including scientists) very vulnerable to attacks, mostly because they are not aware of the nature (and ease) of the attacks and still believe that a "good" password is all they need to be concerned about.We wrote this paper aiming for a better understanding of the subject. In the paper we report some of the major actual known attacks. Besides the description of each attack (the what), we also discuss the way they are carried on (the how) and, when possible, the related means of prevention, detection and/or defense.