Saad Alsunbul1,2, Phu Dung Le1 and Jefferson Tan1
1Caulfield School of Information Technology, Monash University, Melbourne,Australia
2Computer Research Institute, King Abdullaziz for Science and Technology, Riyadh,Saudi Arabia
ABSTRACT
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason behind that, there is a few researches that examine the behavior of hackers. This paper formally and practically examines in details the behavior of hackers and their targeted environments. Moreover, this paper formally examines the properties of one essential pre-hacking step called scanning and highlights its importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.
KEYWORDS
Hacking, network security, security properties, pre-hacking, scanning, necessary information
No comments:
Post a Comment