Module-4-Introduction To Cyber Attacks
Module-4-Introduction To Cyber Attacks
1
Objectives
2
Learning Outcomes
3
Outline
4
Evolution of Cyber Attack
5
First- Major Cyber Attack
6
The Morris Internet Worm
7
Definition of Cyber Attack
8
Characteristics of Cyber Attacks
Regimented
Not Scrupulously
spontaneous designed or
or ad hoc Harmonized
Characteristics
of Cyber
Attacks
Demanding
Organized Time and
Resource
Enormous
9
Basic categories of Cyber Attack
Volume-based
Attacks
Cyber Attack
Application Protocol
Attacks Attacks
10
Purpose and Motivation for Cyber
Attacks
• Obstruction of Information
• Denigration in the Reputation of the country
• Denial in providing public services
• Smashing up legal Interest
• Counter International cyber security measures
• Retardation of decision-making process
• Abatement of public confidence
11
Classification of Attacks
Cyber Attack
Classification
Reconnaissance Attacks in
Attack Cyber Crime Malicious MANET
Active Attacks
Cyber Large-Scale
Access Attack Attacks in
Passive Attack
Espionage WSN
Denial of Service Attacks
Cyber Non-Malicious
Attack
Terrorism Small-Scale
Attack
Cyber War
12
Classification of Cyber Attack : Based
on Purpose
Reconnaissance Attack
Based on
purpose Access Attack
13
Reconnaissance Attack
• This attack is also called as System mapping,
services and unauthorized detection
• Reconnaissance attacks takes place in any of
the forms
Packet
Sniffers
Queries
regarding Reconnaissance Scanning
Internet Attack the Port
Information
Sweeping
the Port
14
Access Attack
Attacks on Secret
Code Phishing
15
Denial of Service Attack
• It is crashing the system to render it slow or
unusable
• It may involve corruption or deletion of
data/information
• It also disables the network system by
declining services to known users
16
Legal Classification
17
Based on Severity of Involvement
Active
Attack
Based on the
severity of
involvement
18
Based on Scope
Based on Scope
Non-malicious small-scale
Malicious large-scale Attack Attack
19
Based on Network Types
Based on
Network
Types
20
MANET Attacks types
Byzantine
Overlay Byzantine
Wormhole attack
Attack
Byzantine Flood
Worm hole Rushing
Attack Attack
21
WSN Attacks
WSN Attacks
Attacks based on the network
layers
22
Different Types of Attacks
Name of the Description Examples
attack
Reconnaissance It involves unauthorized a) Packet Sniffers
attack detection system mapping b) Port Scanning
and services to steal data. c) Ping Sweeps and
d) DNS (Distributed Network
Services) queries
Access attack It is an attack where intruder a) Port trust utilization
gains access to a device to b) Port redirection
which he has no right for c) Dictionary attacks
access. d) Man-in-the-Middle attacks
e) Social engineering attacks
and phishing
Denial of Service It is the Intrusion into a a) Smurf
(DoS) attack system by disabling the b) SYN Flood
network with the intent to c) DNS attacks
deny service to authorized d) DDoS (Distributed Denial of
users. Service) attack 23
Different Types of Attacks
Name of the Description Examples
attack
Cyber crime It is the use of computer and a) Identity theft
Internet to exploit users for b) Credit card fraud
materialistic gain.
Cyber It is the act of using the a) Tracking Cookies
espionage internet to spy on others for b) RAT Controllable
gaining benefit.
Cyber terrorism It is the use of cyber space for a) Crashing the power grids by
creating large scale disruption al-Qaeda via a network
and destruction of life and b) Poisoning of water supply
property.
Cyber war It is the act of a nation with the a) Russia’s war on Estonia
intention of disruption of (2007)
another nation’s network to b) Russia’s war on Georgia
gain tactical and military (2008)
advantages.
24
Different Types of Attacks
Name of the Description Examples
attack
Active attacks It is the attack of data a) Masquerade
transmission to all parties b) Replay
thereby acting as a liaison c) Modification of message
enabling server compromise.
Passive attacks It is the attack which is primarily a) Traffic Analysis
eavesdropping without meddling b) Release of message
with the database. contents
Malicious It is the attack with deliberate a) Sasser attack
attack intent to cause harm resulting in
large scale disruption.
Non-malicious It is the accidental attack a) Registry corruption
attack caused due to mis-handling or b) Accidental erasing of
operational mistakes with minor hard disk
loss of data.
25
Different Types of Attacks
26
Conclusion
27
Thank you
28