Network attacks: Taxonomy, tools and systems

被引:140
作者
Hoque, N. [1 ]
Bhuyan, Monowar H. [1 ]
Baishya, R. C. [1 ]
Bhattacharyya, D. K. [1 ]
Kalita, J. K. [2 ]
机构
[1] Tezpur Univ, Dept Comp Sci & Engn, Tezpur 784028, Assam, India
[2] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80933 USA
基金
美国国家科学基金会;
关键词
Network attacks; Tools; Systems; Protocol; DoS; INTRUSION-DETECTION; DDOS ATTACKS; DEFENSE;
D O I
10.1016/j.jnca.2013.08.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent and defend networks from the occurrence of attacks, it is highly essential that we have a broad knowledge of existing tools and systems available in the public domain. Based on the behavior and possible impact or severity of damages, attacks are categorized into a number of distinct classes. In this survey, we provide a taxonomy of attack tools in a consistent way for the benefit of network security researchers. This paper also presents a comprehensive and structured survey of existing tools and systems that can support both attackers and network defenders. We discuss pros and cons of such tools and systems for better understanding of their capabilities. Finally, we include a list of observations and some research challenges that may help new researchers in this field based on our hands-on experience. (c) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:307 / 324
页数:18
相关论文
共 62 条
[1]  
[Anonymous], P ANN C USENIX 06 AN
[2]  
[Anonymous], GLOBAL INFORM ASSURA
[3]  
[Anonymous], 2004, P 6 C S OP SYST DES
[4]  
[Anonymous], P 2001 IEEE IFIP INT
[5]  
[Anonymous], ETTERCAP PRIMER
[6]  
[Anonymous], TECHNICAL REPORT
[7]  
[Anonymous], 1041 DACS U TWENT
[8]  
[Anonymous], LOSSLESS GIGABIT REM
[9]  
[Anonymous], 2006, Wireshark Ethereal network protocol analyzer toolkit
[10]  
[Anonymous], IEEE COMMUNICATIONS