Friday, April 28, 2017

DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES

Saad Alsunbul1,2, Phu Dung Le1 and Jefferson Tan1
1Caulfield School of Information Technology, Monash University, Melbourne,Australia
2Computer Research Institute, King Abdullaziz for Science and Technology, Riyadh,Saudi Arabia


ABSTRACT
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason behind that, there is a few researches that examine the behavior of hackers. This paper formally and practically examines in details the behavior of hackers and their targeted environments. Moreover, this paper formally examines the properties of one essential pre-hacking step called scanning and highlights its importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.

KEYWORDS
Hacking, network security, security properties, pre-hacking, scanning, necessary information

                                                                 More Details 

No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercr...