Security knowledge today's most popular cyber attacks six trends

Source: Internet
Author: User

In recent years, the network attacks technology and the attack tool has the new development tendency, causes the organization which uses the Internet to run the business to face the unprecedented risk, this article will carry on the analysis to the network attack new trend, enables the reader to understand, the appraisal, and reduces these risks.

Trend One: Automation level and attack speed increase

The level of automation for attack tools is constantly improving. Automatic attacks typically involve four phases, and new changes occur at each stage. Scan for possible victims. Since 1997, extensive scans have become accustomed. Currently, the scanning tools use more advanced scanning mode to improve the scanning effect and improve the scanning speed. Damage to fragile systems. Previously, security vulnerabilities were exploited only after extensive scans had been completed. Now the attack tool exploits these vulnerabilities as part of the scan activity, which speeds up the attack. Spread the attack. Before 2000, the attack tool needed someone to launch a new round of attacks. At present, the attack tool can launch a new round of attacks on its own. Tools such as red code and Nimda can spread themselves and reach global saturation point in less than 18 hours. Coordinated management of attack tools. With the advent of distributed attack tools, attackers can manage and coordinate a large number of deployed attack tools that are distributed across many Internet systems. At present, distributed attack tools can more effectively launch denial of service attacks, scan potential victims, and endanger the system with security problems.

trend two: Increasingly complex attack tools

Attack tool developers are taking advantage of more sophisticated technology-armed attack tools. The features of the attack tools are more difficult to find than before, and they are harder to detect using features. The attack tool has three features: anti-detection, the use of covert attack tool characteristics of the technology, which allows security experts to analyze the new attack tools and learn more time spent on new attacks, dynamic behavior, the early attack tool is in a single determined sequence to execute the attack steps, today's automatic attack tool can be based on random selection, Predefined decision paths or directly managed through intruders, to change their patterns and behavior; the maturity of the attack tool, unlike earlier attack tools, can be quickly changed by an upgrade or a part of the tool to launch a rapidly changing attack, and there will be several different forms of attack tools in each attack. In addition, attack tools are increasingly commonly developed to be performed on a variety of operating system platforms. Many common attack tools use protocols such as IRC or HTTP (Hypertext Transfer Protocol) to send data or commands from intruders to the attacked computer, making it more and more difficult for people to distinguish between attack characteristics and normal, legitimate network traffic.

trend Three: Discovering security vulnerabilities getting faster

New vulnerabilities are added one more times a year, and managers continue to patch these vulnerabilities with the latest patches, and each year a new type of security vulnerability is discovered. Intruders are often able to discover the target before the vendor fixes these vulnerabilities.

trend Four: More and more high firewall penetration rate

Firewalls are the main protective measures that people use to guard against intruders. But more and more attack techniques can bypass firewalls, such as IPP (Internet Print Protocol) and WebDAV (web-based Distributed Authoring and translation) that can be exploited by attackers to circumvent firewalls.

Total 2 page: previous 1 [2] Next page



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.