Types Of Attacks In Network Security

Types Of Attacks In Network Security

network security,types of attacks in network security,types of security attacks,security attacks,passive attack in network security,attacks,types of attack in network and cyber security,security,type of attacks in network security,network security attacks,types of attacks,cyber security,types of firewall in network security,security attacks in network security,types of attack,network,
Types Of Attacks In Network Security

Network security attacks are unauthorized actions against private, corporate or governmental IT assets in order to destroy them, modify them or steal sensitive data.
A passive attack is one that does not affect any system, although information is obtained. A good example of this is wiretapping.

An active attack has the potential to cause major damage to an individual’s or organization’s resource because it attempts to alter system resources or affect how they work. A good example of this might be a virus or other type of malware.

If You Read About What Is Virus & How to Prevent Them? Just click on the link & Read Out...

A few different types of Attacks that network attackers and hackers perform.

Denial-of-Service (DoS) Attack

denial-of-service attack,ddos attack,attack,dos attack,denial of service attack,denial of service,denial-of-service attack (literature subject),ddos attacks,distributed denial-of-service attack,dos attack tutorial,types of dos attack,distributed denial of service,how ddos attack work,attacks,denial of service attack types,denial of service attacks,ddos attack live,
Denial of Service (DoS) attack
  • A DoS attack renders a network, host, or other pieces of infrastructure unusable by legitimate users.
  • After gaining access to your network, the attacker can do any of the following:
  • Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.
  • Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.
  • Block traffic, which results in a loss of access to network resources by authorized users.
  • Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking.
  • There are different types of DoS and DDoS attacks; the most common are TCP SYN flood attack, teardrop attack, smurf attack, ping-of-death attack, and botnets.

Distributed Denial of Service (DDoS) Attack

  • DDoS is a type of DOS attack where multiple compromised systems, are used to target a single system causing a Denial of Service (DoS) attack. DDoS attacks are much harder to detect and defend against a DoS attack from a single host.

Man-in-the-middle (MitM) Attack

man-in-the-middle attack,man in the middle attack,mitm attack,man-in-the-middle,attack,man in the middle,main-in-the-middle attack,mitm,hacking,man in the middle (mitm) attack,man in the middle attack kali,man in middle attack,perform man in the middle attack,what is a man in the middle attack,man in the middle attack tutorial,how man in the middle attack works,

A MitM attack occurs when a hacker inserts itself between the communications of a client and a server. a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently.
  • A client connects to a server.
  • The attacker’s computer gains control of the client.
  • The attacker’s computer disconnects the client from the server.
  • The attacker’s computer replaces the client’s IP address with its own IP address and
  • spoofs the client’s sequence numbers.
  • The attacker’s computer continues the dialog with the server and the server believes it is still communicating with the client.

IP Spoofing

  • The attacker sends a packet with the IP source address of a known trusted host instead of its own IP source address to a target host. The target host might accept the packet and act upon it.
  • To solve this problem, we will need end-point authentication, that is, a mechanism that will allow us to determine with certainty if a message originates from where we think it does.
If You Don't Know About What Is Cryptography & Its Types? Click On Link & Read Out...

Phishing Attack

  • In phishing attack the hacker creates a fake web site that looks exactly like a popular site such as the SBI bank.
  • The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site.

Password Attack

Password attack An attacker tries to crack the passwords stored in a network account database or a password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack.

  • Brute-force password guessing means using a random approach by trying different passwords and hoping that one work Some logic can be applied by trying passwords related to the person’s name, job title, hobbies or similar items.
  • In a dictionary attack, a dictionary of common passwords is used to attempt to gain access to a user’s computer and network.

SQL Injection Attack

sql injection,sql injection attack,injection,sql injection tutorial,sql injection demo,sql injection tutorial for beginners,sql injection attack step by step,sql injection basics,sql injection attack example,sql injection attack tutorial,sql injection kali,sql injection tool,sql injection example,sql injection cheat sheet,what is a sql injection,sql injections,sql attack,blind sql injection,
  • SQL injection has become a common issue with database-driven websites. A successful SQL injection exploit can read sensitive data from the database, modify (insert, update or delete) database data, execute administration operations (such as shutdown) on the database, recover the content of a given file.
  • To protect yourself from a SQL injection attacks, apply least0 privilege model of permissions in your databases.

Cross-site Scripting (XSS) Attack

  • XSS attacks use third-party web resources to run scripts in the victim’s web browser.
  • The attacker injects a payload with malicious JavaScript into a website’s database. When the victim requests a page from the website, the website transmits the page, with the attacker’s payload as part of the HTML body, to the victim’s browser, which executes the malicious script.
  • To defend against XSS attacks, developers can sanitize data input by users in an HTTP request before reflecting it back. Make sure all data is validated, & filtered.


Network communications occur in an unsecured or “cleartext” format, which allows an attacker who has gained access to data paths in your network to “listen in” or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping.

 Eavesdropping can be passive or active:

  • Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
  • Active eavesdropping — A hacker actively grabs the information by disguising himself as a friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.

Malware Attack

malware,malware attack,ransomware attack,attack,cyber attack,malware (software genre),ransomware,malware attacks,malware explained,how to prevent malware attack,what is malware,types of malware,north korea wannacry malware attack,how to remove malware,how to protect against malware attacks,how to prevent the latest malware attacks,how to prevent browser based malware attacks,ransomeware attack,
Malware Attack
  • Malware is a harmful code or software that is specially designed to damage, disrupt, or illegitimate action on data, hosts or networks. Malware can be a virus, worm, trojan, adware, spyware, rootkit, etc.
  • Once installed on your computer, these programs can seriously affect your privacy and your computer's security normally for the benefit of some third party, without the user’s permission. 
If You Are Completed Study About Malware? Just Click On Link & Read Out...

Packet Sniffer –

  • A passive receiver that records a copy of every packet that flies by is called a packet sniffer. By placing a passive receiver in the vicinity of the wireless transmitter, that receiver can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages.
  • The best defenses against packet sniffing involves cryptography.

Why is network security important?

Unfortunately for modern enterprises, hacker knowledge, attack tools, and botnet-for-hire are more readily available than ever before, helping to increase the prevalence and the sophistication of Internet-borne network attacks.

These cyber-attacks have two overarching outcomes for enterprises: firstly, they result in costly damages to IT infrastructure. Secondly, they incur a further loss of revenue by diminishing brand reputation, for example, losing customers due to data breaches.

Post a Comment