Networks are necessary for everyone to communicate with each other over long distances. People tend to transfer data instantly between each other via the Internet to save time. Unfortunately, there are also people who abuse it to perform different types of attacks, also known as network attacks, in order to take advantage. According to the US Department of Defense (n.d.), network attack is an act of disrupting, denying, degrading, or destroying data in computers and computer networks, or the computers and networks themselves. There are many types of network attacks, but only 3 common attacks can be found in the book "Seven deadliest network attack" by Borkin, Kraus and Prowell (2010) and "CompTIA security+ all-in-one exam guide (Exam SY0-301) third edition” by (Conklin, White, Williams, Davis, & Cothren, 2011). The types of network attacks we will focus on are the Denial of Service attack, the War Dialing attack, and the man-in-the attack. -middle (refer to Figure 1.1 in Appendix 1).The first type of network attacks is called Denial of Service (DoS attack). Convery (2004), DoS attack is an act of intentionally degrading or blocking the computer network resources of others. Resources can refer to network bandwidth, computing power, or operating system data structures (Patrikakis, Masikos & Zouraraki, 2004).The attacker's common goal in performing a DoS attack is to suspend and disrupt other host computers, making their network resources unavailable (Borkin, Kraus & Prowell, 2010). This can be achieved by sending mass messages to the target until the target's resources are overwhelmed, where in reality the same scenario as a traffic jam occurs. In a DoS ...... middle of paper ......ys during the key exchange process of both hosts. Normally the data will be transmitted directly from your network to your friend's network. However, due to the communication path intercepted by the attacker, the data will now be transferred to the attacker's network first before being transferred to your friend. Since the public keys are still in the hands of the attacker, the attacker can now decrypt the data sent by both of you, which results in the theft of data or communication details between you and your friend (refer to Figure 2.2 in the Appendix 2). In conclusion, the types of network attacks that the report focuses on are Denial of Service attacks, War Dialing attacks, and man-in-the-middle attacks. Although networks are necessary for everyone as they offer many benefits, there are also people who abuse them to perform immoral acts against other innocent users..
tags