Over the last decade, computer networks have been subject to widespread security attacks. Some are spoofing attacks, Denial of Service (DoS) attacks and its various forms (like ping attacks, smurfing etc), password sniffing, packet capturing along with traffic analysis and other wireless key cracking attacks. Many of these attacks steal someone's identity and use it for exploiting the victim or others by masquerading or forgery, made the network or computer system inoperable by interrupting normal services, created a back door for re-visits etc. In this paper we analyze some of these attacks and evaluate its effectiveness, concluding with some security recommendations.
|Title of host publication||2007 5th Student Conference on Research and Development, SCORED|
|ISBN (Print)||1424414709, 9781424414703|
|Publication status||Published - 11 Dec 2007|
|Event||2007 5th Student Conference on Research and Development, SCORED - Selangor, Malaysia|
Duration: 11 Dec 2007 → 12 Dec 2007
|Conference||2007 5th Student Conference on Research and Development, SCORED|
|Period||11/12/07 → 12/12/07|