A Survey of Network-based Security Attacks

Koffka Khan Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I Email: koffka.khan@gmail.com Wayne Goodridge Department of Computing and Information Technology The University of the West Indies, Trinidad and Tobago, W.I Email: wayne.goodridge@sta.uwi.edu.com ----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------

[1]  Sheikh Ariful Islam,et al.  An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).

[2]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[3]  Sudhir Aggarwal,et al.  Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.

[4]  Matthias Jarke,et al.  Query Optimization in Database Systems , 1984, CSUR.

[6]  D. Flannanghan JavaScript: The definitive guide , 1999 .

[7]  D.M. Cohen,et al.  The Combinatorial Design Approach to Automatic Test Generation , 1996, IEEE Softw..

[8]  Bjarne Stroustrup,et al.  C++ Programming Language , 1986, IEEE Softw..

[9]  Douglas Crockford,et al.  The application/json Media Type for JavaScript Object Notation (JSON) , 2006, RFC.

[10]  Gilbert Held,et al.  The TCP/IP Protocol Suite , 2001 .

[11]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[12]  Andrew V. Royappa The PHP web application server , 2000 .

[13]  Sonali B. Wankhede,et al.  Study of Network-Based DoS Attacks , 2018, Nanoelectronics, Circuits and Communication Systems.

[14]  Richard P. Guidorizzi Security: Active Authentication , 2013, IT Prof..

[15]  Al Stevens,et al.  C programming , 1990 .

[16]  B. Goode,et al.  Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.

[17]  Xiaoyun Wang,et al.  How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.

[18]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[19]  Muhammad Salman,et al.  Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.

[20]  Sudhir Aggarwal,et al.  New Technologies in Password Cracking Techniques , 2018 .

[21]  Ian S. Graham The HTML SourceBook , 1995 .

[22]  Justin Clarke,et al.  SQL Injection Attacks and Defense , 2009 .

[23]  Vinod Yegneswaran,et al.  An Inside Look at Botnets , 2007, Malware Detection.

[24]  M. Sarosh Umar,et al.  One-Tip Secure: Next-Gen of Text-Based Password , 2019 .

[25]  Alessandro Orso,et al.  A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.

[26]  Mauro Conti,et al.  Amplified Distributed Denial of Service Attack in Software Defined Networking , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[27]  Edward Pollack Protecting Against SQL Injection , 2016 .

[28]  Xiaomin Liu,et al.  Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.

[29]  Lei Guo,et al.  Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach , 2020, IEEE Transactions on Cybernetics.

[30]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[31]  Priya Narasimhan,et al.  Active network based DDoS defense , 2002, Proceedings DARPA Active Networks Conference and Exposition.

[32]  Leland L. Beck,et al.  System Software: An Introduction to Systems Programming , 1985 .

[33]  Nghi Nguyen,et al.  Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 , 2002, ISC.

[34]  Zhu Cheng-rong Comparison of approaches to data security implementation based on PHP , 2009 .

[35]  Jacques Patarin,et al.  How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function , 1992, EUROCRYPT.

[36]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[37]  Alexandr Andoni,et al.  Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[38]  Ronaldo M. Salles,et al.  Botnets: A survey , 2013, Comput. Networks.

[39]  David L. Mills,et al.  Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.

[40]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[41]  Jacob M. Howe,et al.  Detecting Cross-Site Scripting Attacks Using Machine Learning , 2018, AMLTA.

[42]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[43]  Norman Ramsey,et al.  Specifying representations of machine instructions , 1997, TOPL.

[44]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[45]  Patrick Valduriez,et al.  Principles of Distributed Database Systems , 1990 .

[46]  Peter Wisskirchen,et al.  Object-Oriented and Mixed Programming Paradigms , 1996, Focus on Computer Graphics.

[47]  Dmitry Khovratovich,et al.  Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..

[48]  Daya Gupta,et al.  NFC based secure mobile healthcare system , 2014, 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS).

[49]  Leland L. Beck System software: an introduction to systems programming (2nd ed.) , 1990 .