1.

What Are Attacks Detected By A Nids?

Answer»

Attacks detected by a NIDS:
Scanning Attack : In such attacks, an attacker sends various kinds of packets to probe a system or network for VULNERABILITY that can be exploited.
Denial of Service (DoS) Attacks : A Denial of Service attack attempts to slow down or completely shut down a target so as to disrupt the service and deny the legitimate and authorized users an access. Such attacks are very common in the Internet where a collection of HOSTS are often used to BOMBARD web servers with dummy requests . Such attacks can cause significant economic damage to ecommerce businesses by denying the customers an access to the business. There are a number of different kinds of DoS attacks, some of which are mentioned below.

  • FLAW Exploitation DoS Attacks
  • Flooding DoS Attacks

Penetration Attacks : In penetration attack, an attacker gains an unauthorized control of a system, and can modify/alter system state, read files, etc. Generally such attacks exploit certain flaws in the software, which enables the attacker to install viruses, and malware in the system. The most common types of penetration attacks are:

  • USER to root
  • Remote to user
  • Remote to root
  • Remote disk read
  • Remote disk write

 

Attacks detected by a NIDS:
Scanning Attack : In such attacks, an attacker sends various kinds of packets to probe a system or network for vulnerability that can be exploited.
Denial of Service (DoS) Attacks : A Denial of Service attack attempts to slow down or completely shut down a target so as to disrupt the service and deny the legitimate and authorized users an access. Such attacks are very common in the Internet where a collection of hosts are often used to bombard web servers with dummy requests . Such attacks can cause significant economic damage to ecommerce businesses by denying the customers an access to the business. There are a number of different kinds of DoS attacks, some of which are mentioned below.

Penetration Attacks : In penetration attack, an attacker gains an unauthorized control of a system, and can modify/alter system state, read files, etc. Generally such attacks exploit certain flaws in the software, which enables the attacker to install viruses, and malware in the system. The most common types of penetration attacks are:

 



Discussion

No Comment Found