Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.
[1] D. Hanson, "ARIS Top Ten 2005 Threats," Security Focus, 2005.
Available http://www.securityfocus.com/corporate/research
[2] Netcraft, "Netcraft Web Server Survey," 2005. Available
http://www.netcraft.com/survey
[3] L. Zeltser, E. Skoudis, W. Stratton, and H. Teall, Malware: Fighting
Malicious Code, Prentice Hall, 2003.
[4] A. Young and M. Yung, "Cryptovirology: Extortion-Based Security
Threats and Countermeasures," IEEE Symposium on Security & Privacy,
pp. 129-141, 1996.
[5] Z. Tamimi and J. Khan, "Model-Based Analysis of Two Fighting
Worms," IEEE/IIU Proc. of ICCCE '06, Kuala Lumpur, Malaysia, pp.
157-163, May 2006.
[6] R. Power, "CSI/FBI Computer Crime and Security Survey," Computer
Security Issues & Trends, vol. 8, no.1, 2002.
[7] AusCERT, "Australian Computer Crime and Security Survey," 2002.
Available http://www.auscert.org.au
[8] R. Zalenski, "Firewall Technologies," IEEE Potentials, vol. 21, no. 1,
pp. 24-29, 2002.
[1] D. Hanson, "ARIS Top Ten 2005 Threats," Security Focus, 2005.
Available http://www.securityfocus.com/corporate/research
[2] Netcraft, "Netcraft Web Server Survey," 2005. Available
http://www.netcraft.com/survey
[3] L. Zeltser, E. Skoudis, W. Stratton, and H. Teall, Malware: Fighting
Malicious Code, Prentice Hall, 2003.
[4] A. Young and M. Yung, "Cryptovirology: Extortion-Based Security
Threats and Countermeasures," IEEE Symposium on Security & Privacy,
pp. 129-141, 1996.
[5] Z. Tamimi and J. Khan, "Model-Based Analysis of Two Fighting
Worms," IEEE/IIU Proc. of ICCCE '06, Kuala Lumpur, Malaysia, pp.
157-163, May 2006.
[6] R. Power, "CSI/FBI Computer Crime and Security Survey," Computer
Security Issues & Trends, vol. 8, no.1, 2002.
[7] AusCERT, "Australian Computer Crime and Security Survey," 2002.
Available http://www.auscert.org.au
[8] R. Zalenski, "Firewall Technologies," IEEE Potentials, vol. 21, no. 1,
pp. 24-29, 2002.
@article{"International Journal of Business, Human and Social Sciences:49362", author = "J. Dubois and P. Jreije", title = "Mechanisms of Internet Security Attacks", abstract = "Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.", keywords = "DoS, internet attacks, router attack, security, trojan,virus, worm, XSS.", volume = "2", number = "8", pages = "797-3", }