Refining Anomalistic Malicious Attacks in Sovereign Setup

Provided by: International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Topic: Security
Format: PDF
Internet is a widely used technology, globally interconnected networks with the use of standard Internet Protocols (IP) to aid abundance of users across the globe. Recently, Internet is afflicted by malicious actions such as spam, phishing to malware, Denial-of-Service (DoS), Man in the middle attack, Eavesdropping attacks etc. Much of it's prospered enemies on attack of compromised hosts, which are scattered throughout the IP networks and starts intruding the network. Malicious activity is not necessarily to be uniformly distributed across the Internet: some networks may occupy lax security, resulting in large populations of compromised machines, while others may secure the network from deleterious attacks.

Find By Topic