0% found this document useful (0 votes)
73 views3 pages

Hackers and Intruders: Motives and Difference

Hackers and intruders

Uploaded by

aminu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views3 pages

Hackers and Intruders: Motives and Difference

Hackers and intruders

Uploaded by

aminu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

International Journal of Electronics and Computer Science Engineering 1446

Available Online at www.ijecse.org ISSN- 2277-1956

Hackers and Intruders: Motives and Difference


Mr. Sushant Mangasuli
Department of Computer Science and Engg, AIET, Moodbidre
Email: [email protected]

Abstract: This paper presents the motives of hackers and intruders, and also there difference between them and also intentions
with their way of thinking, planning and performing attacks for their personal gain and as well as others grow up. This shows
the security of computer networks and information systems can’t protect effectively if the human factor fails. Here explaining
how the network is hacked or intruded by using several numbers of tools with achieving their motives.

Keywords: Security, criminal, network scanning, motives hackers, intruders.

I. INTRODUCTION
The usual way of analyzing network security model is using through different technologies like IDS, IPS, firewalls, UTMs,
access control lists and cruel software defense etc. To covering all these various technology areas to achieve organizational
security with basis of network security architecture, design, policies and procedures. The common aim is to intend this
‘acceptable security risk’ and to target with network security model by using other security and protections systems
Hacking means finding out weaknesses in a computer or computer network and exploiting them, though the term
can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated
by a multitude of reasons, such as profit, protest, or challenge. But the intruders are basically who violate networks and
information systems. The intruders are aware of weakness in system and networks through their continuously network
scanning programs.
Here in this paper gives the difference between hackers and intruders but their goal is same to violate or stealing
the information and to break the wall of weaker network security model architectures.
II. WHAT HACKERS MEANS AND THEIR MOTIVES:
The most common usage of "hacker" is to breakdown computer security without authorization or indeed, usually through a
computer network or the internet for terrorism, vandalism, credit card fraud, identity theft, intellectual property theft, and
many other forms of crime. This can mean taking control of a remote computer through a network, or software cracking.
These hackers are called cracker or black-hat hacker or simply "criminal”. But the one who help the government or
organization to trace the intrusions of black-hat hacker and break the network or information by criminals called as “Ethical
Hacker”.
The history of hackers in prior to mid-1980s, was blur, means hacker known only as researchers in universities and
corporate research parks. But in 1983 film “War Games” was a boom in home hacking. That time many unfortunately true
hackers was popularized also as criminal and disaster in networks.
Hacker is someone that seeks to understand computer, phone or other systems strictly for the satisfaction of having
that knowledge. Hackers wonder how things work and have an incredible curiosity. Hackers will sometimes do questionable
legal things, such as breaking into systems, but they generally will not cause harm once they break in. Contrast a hacker to
the term cracker. A hacker is a person who is proficient with computers and/or programming to an elite level where they
know all of the in's and out's of a system. There is NO illegality involved with being a hacker. What the hacker does with
their knowledge of systems within the definition of the law is what defines them as a hacker vs a cracker. It's then safe to
say that all crackers are hackers, but not all hackers are crackers. This is an important distinction.
In the new generation that assumed “hacker” is defined for beginning by crime only. The modern day hackers have
enormously more power available through the internet access, and they are easily breaking the network access by using
user-friendly hacking tools.
The hacker main motives are:
• Recreation: Those who hacks in to network for ‘just fun’ or to prove their technical powers.
• Remuneration: The people who hack the network for personal gain like attempt to transfer funds in their own bank
accounts, ‘hackers for hire’ as to break the network on paid by others basis.

ISSN 2277-1956/V1N3-1446-1448
1447
Hackers and Intruders: Motives and Difference

• Revenge: Dissatisfied customers, disgruntled former employees, angry competitors comes in this category.

Ex-employees do for revange with employeers Professional hackers do for money Students do hacking for knowledge and
revange Terrories do hacking to break goverment structure In conclusion, motive of hacking is different for business to
business

III. WHAT INTRUDER’S MEANS AND THEIR MOTIVES

A network intruder are gaining access through unauthorized access to networking devices through physical, system and
remote attempts. The intruder uses some outdated exploits that are ineffective against upto- date patched hosts. The
intruders are of two types. One is external intruder is an unauthorized user of the system or network, and the internal
intruder is an authorized user who has access to certain areas of the internal system or network.
The intruders are basically three forms one ‘masquerade user’ who is authorized user to use computer, second
‘misfeasor’ legitimate user who misuse his/her privileges and third ‘clandestine user’ who seizes his supervisory control of
the system and uses it to suppress audit information.
The intruder’s main motives are-
• To use the host as a spam relay to continuous flood in the network
• To establish a web server (non-privileged port) to be used for some phishing scam.
• To perform network scanning to find out vulnerable hosts in the network.
• To install an FTP server for distributing illegal content on network (ex. pirated software or movies)

Tools used by Hackers & Intruders:


There are several common tools used by computer criminals to penetrate network as:
• Trojan horse- These are malicious programs or legitimate software is to be used set up a back door in a computer
system so that the criminal can gain access.
• Virus- Code embedded within a program that causes a copy of itself to be inserted in other programs and performs
some unwanted function.
• Worm - That can replicate itself and send copies to computers across the network and performs some unwanted
function Uses network connections to spread from system to system
• Vulnerability scanner – This tool is used by hackers & intruders for quickly check computers on a network for known
weaknesses. Hackers also use port scanners. This check to see which ports on a specified computer are "open" or
available to access the computer.
• Sniffer – This is an application that captures password and other data in transit either within the computer or over the
network.
• Exploit – This is an application to takes advantage of a known weakness.
• Social engineering – Through this to obtain some form of information.
• Root kit - This tool is for hiding the fact that a computer's security has been compromised.

IV. DIFFERENCE BETWEEN INTRUDERS AND HACKERS:

Hackers find the loophole and security issues in the computer networks or in web servers, so that administrator can fix them.
The hackers have great knowledge and skills in programming and other computer related technologies. They do the things
in ethical way and experts. But the goal of intruder is no damage of network, the technical aspects and how to overcome as
learners and status symbol among the hacker community.
“A hacker is a person who intensely interested in the workings of any computer operating system. The hackers are
most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages.
They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge; freely
share what they have discovered, and never intentionally damage data.
The intruder is one who breaks into or otherwise violates the system integrity of remote machines with malicious
intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for
their targets. Crackers can easily be identified because their actions are malicious.”
IJECSE,Volume1,Number 3
Sushant Mangasuli et al.

The difference between hacker and intruder might not seem much to the average person because after all divided
into two computers and networks not allowed but that is what matters the person made after he infiltrates a network.

V. RESULT ACHIEVED AND FUTURE RESEARCH:

Through the basic details, classifications and analysis of hackers and intruders, that they trying to violate networks and
information systems. The final purpose is to tone down risks and give suggestions and direction for building a security
protection system, with using intrusion detection and intrusion prevention systems. There are many difficulties in attempt to
make this works to be happen, such as:
• Many of the organizations are not ready to disclose details about their problems they have been experiencing or facing.
• The peoples are not ready to speak openly about their attacks and hackers exploits.
• This area requires very often to have good relation to people that are from “grey” zone, what is not so easy and popular.
• There is not any open journalism that treats this problem to be resolving completely.
There are many other problems also in this future research related to legal and ethical and similar other issues.

VI. CONCLUSION:
This paper focuses on the difference between hackers and intruders. The hackers and intruders have major motives and
intention by using various classifications of tools for penetrating the network. The hacker who hacks or theft the information
in network for personal gain or any other gain, which classified as black hat hacker and ethical hacker. The intruders are
who intrude continuously through network scanning using with sniffers in network for penetrating the network to achieve
their motives. The result achieved and future research on intruders and hackers with classification and analysis for violating
network and information systems but actually many organizations are not shared their data in case of affecting their systems
and networks. This is actual fact to lack in resolving the issues about hackers and intruders. The technical mechanisms and
some complex technologies can’t guarantee security and many protection systems fail due to human mistakes and
omissions.
VII. REFERENCES

[1] William Stallings ,”Network security essentials: applications and standards”,pp 110,2010
[2] http://www.research.ibm.com/antivirus/ IBM’s site on virus information. Very good papers – a little outdated
[3] http://www.afsa.org/fsj/sept00/Denning.cfm Hacktivism: An Emerging Threat to Diplomacy, another Denning term
along with Information Warfare
[4] Carl Endorf, Eugene Schultz and Jim Mellander "Intrusion Detection and Prevention", pp 215, 2004.
[5] Thomas W. Shinder, Debra Littlejohn Shinder, Adrian F. Dimcev, “Dr. Tom Shinder's ISA Server 2006 Migration
Guide” .
[6] Ed Skoudis, Malware : Fighting Malicious Code and Analyzing Malicious Code by Cameron H. Malin
[7] Ross Anderson and John Wiley and Sons, Security Engineering - A review of Security Techniques and a personal view
of the security world,2011.
[8] Dragan Pleskonjic ”Psychologi-cal Profile of Network Intruder “.
[9] Digital Crime: Hackers, Part 1 -Release date: 12/03
[10] Peter Stephenson ,”Computer-Related Crime A handbook for corporate”. By CRC Prss LLC,2000.

Author Biography
Mr. Sushant Mangasuli, working as Assistant Professor, Department of Computer Science and Engineering, Alva’s
Institute of Engineering and Technology, Moodbidre. He received his M.Tech from VTU in Computer Network
Engineering. His fields of interest are Computer networking, Operating System, Cryptography and network security, Image
Processing.

ISSN 2277-1956/V1N3-1446-1448

You might also like