StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Detection of Attacks Executed by Multiple Users - Dissertation Example

Cite this document
Summary
Detection of Attacks executed by multiple users [Name] [Date] The problem of network attacks detection is of crucial importance nowadays. Internet world is magnificent and scaring at the same time. All our efforts can be gone once dark-side hackers make their vicious attempts and try to attack us…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Detection of Attacks Executed by Multiple Users
Read Text Preview

Extract of sample "Detection of Attacks Executed by Multiple Users"

Download file to see previous pages

Some of these mass-users attacks are triggered by the big companies and manipulation of online items reputation can be hazardous for the customers. As a rule, well-known products are chosen for this type of attacks. For example, Amazon books, some hotels in travel sites, and a great number of digital content can be a fertile ground for mass-users attacks. Not only these vicious and hazardous attacks can be the greatest challenge of the electronic life, but still Netizens and other computer world dwellers are intimidated by mass-users attacks.

Under conditions of this type of attacks, fraudulent users implement their well planned strategies and manipulate reputation of numerous target products. To consider these attacks and the ways of dealing with them, it is possible to apply a defense scheme that (1) develops heterogeneous thresholds for developing protection against suspicious products and (2) analyzes focus items on the basis of correlation analysis among suspicious items. Real user data and simulation data should be correlated and on the basis of such kind of correlation it is relevant to identify potential mass-user attackers.

The given scheme shows the main advantages in finding out fraudulent users, recovering challenging errors in the systems, and reducing attacks related to normal products, sites etc.   The problem of attacks executed by multiple users is a complicated task and the modern researches are working in the name of these fraudulent groups identification. The main task of the modern researchers in this field is to apply advanced artificial intelligence and complex adaptive systems to stop, foresee and prevent distributed attacks of the network.

Multiple attackers work together and very often it is difficult to foresee and prevent this type of an attack. Data Reduction Techniques is one of the most convenient means of preventing this type of attacks. IDS approaches are nowadays limited in a proper identification of relevant information in high-speed network data streams. The appropriate analysis of IDS enables taking control over such type of attacks. There is a need to conduct a dynamic and real-time control over current attacks. Relevant information can be processed and it can serve as an input vector to IDS.

There is another challenge, which is a great variety of activity and processes occurring in the network environment to identify a subset of data that is very difficult for analysis. There is a suggestion to design an anomaly detection scheme for prevention of mass online attacks. This underlying scheme is based on several components integration: first is the importance of time-domain change detection, the second step is the importance of system-level visualization, the third are the selection of heterogeneous threshold and a conduct of a proper correlation analysis.

Therefore, we can claim that for prevention and protecting computer systems from mass-users attacks it is necessary to pay attention to the new philosophy. Currently existent schemes of attack prevention and protection are mainly based on homogenous correlation of items and the proposed scheme provides a much better performance in the process of malicious users' detection and reducing impacts on normal issues. Due to a wide range of activities and processes, the identification of fraud in a network environme

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Detection of Attacks Executed by Multiple Users Dissertation”, n.d.)
Detection of Attacks Executed by Multiple Users Dissertation. Retrieved from https://studentshare.org/information-technology/1465924-detection-of-attacks-executed-by-multiple-users
(Detection of Attacks Executed by Multiple Users Dissertation)
Detection of Attacks Executed by Multiple Users Dissertation. https://studentshare.org/information-technology/1465924-detection-of-attacks-executed-by-multiple-users.
“Detection of Attacks Executed by Multiple Users Dissertation”, n.d. https://studentshare.org/information-technology/1465924-detection-of-attacks-executed-by-multiple-users.
  • Cited: 0 times

CHECK THESE SAMPLES OF Detection of Attacks Executed by Multiple Users

Denial of service attacks (DoS)

This sort of attacks (denial of service attack) may target users in an attempt to stop them from creating links on the network.... In simple words, DoS is a security issue that stops legal users to get access to the resource, information or file that they need, when they need it (Chan et al.... Thus it is true fact that some of the DoS attacks can easily be executed through inadequate possessions beside a huge sophisticated environment.... Denial of Service attacks (DoSs) By Student Date Table of Contents Introduction Denial of Service attack or simply DoS can be defined in many ways....
5 Pages (1250 words) Essay

Cellular Network and Smartphone Application Security

hellip; users increased at a phenomenal rate and the concern for security and privacy became more intense.... Crackers and malicious users have become a great threat to security and are constantly trying to find loopholes within new secure systems.... Security is a prime requirement for users today and therefore users should be knowledgeable about their vulnerability to attacks....
7 Pages (1750 words) Report

Management information system

Integrity ensures that the data is not modified or altered by unauthorized users and authentication deals with ensuring that the user is actually the person he claims to be.... Some of them are listed and described briefly below: Viruses A virus is such a program that when it is executed it works within the security policy completely.... Hence, when these programs are executed, the virus activates and spreads throughout the executable code of the computer....
8 Pages (2000 words) Essay

Denial of Service Attacks (DoSs)

This sort of attacks (denial of service attack) may target users in an attempt to stop them from creating links on the network.... They must implement effective techniques to stop illegal users from inserting unauthenticated code.... Cross-site Scripting (XSS) In this kind of attack a web application works as a source of help for launching an attack to an end user's browser by making use of the web browser of other web users who visit the page....
7 Pages (1750 words) Essay

The Software in C++ and Networking

This allows intruders to quickly collect passwords and account names for many users.... du)In terms of availability, it should be kept in mind that several users are accessing the same application simultaneously.... nbsp;In overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information....
14 Pages (3500 words) Essay

Cellular Network and Smart Phone Application Security

The paper “Cellular Network and Smart Phone Application Security” highlights the fact security is a prime requirement for users today and therefore users should be knowledgeable about their vulnerability to attacks.... users increased at a phenomenal rate and the concern for security and privacy became more intense.... Crackers and malicious users have become a great threat to security and are constantly trying to find loopholes within new secure systems....
7 Pages (1750 words) Case Study

Types of Hacking

Hacking is a specialized activity that requires a very specific skill set, a familiarity with computers, with multiple systems or networks, as well as a, relatively, advanced understanding of computer technologies (Howard, 1997).... Any single cyber attack could conceivably involve multiple numbers of actors with varying intentions, which makes it difficult to define the nature of the attack as belonging to any single approach or category (Harris, 2012)....
24 Pages (6000 words) Coursework

Database Security: A Comprehensive Approach

As much as technological advancements improve the overall quality of life, here are inherent side effects in terms of knowledge exploitation by malicious users who aim to attack or intrude into the robust and distributed information systems.... According to research findings of the paper “Database Security:  A Comprehensive Approach”, despite the apparent advances in database security, new challenges are emerging every day....
15 Pages (3750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us