Survey on data modification attacks
One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up unti...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Published: |
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/60433/ https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.60433 |
---|---|
record_format |
eprints |
spelling |
my.utm.604332021-08-01T04:26:17Z http://eprints.utm.my/id/eprint/60433/ Survey on data modification attacks Jama, Ahmed Yousuf Sirat @ Md. Siraj, Maheyzah QA75 Electronic computers. Computer science One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up until now there are attacks that aim to penetrate the system and take advantages from that. Modification data attacks (MDA) can be malicious and cause huge damages to a system. MDA happens when attackers interrupt, capture, modify, steal or delete important information in the system via network access or direct access using executable codes. Most of recent modification, corruption attacks and worms still using known patterns as the control-data attack which are easy to be defeated by protection systems. But, non-control-data attacks can damage a vast applications, which always work with decision-making data, user input data, configuration data and user identity data. Therefore, in this survey we summarize and discuss important vulnerabilities to non-control data attacks in following applications which are Telnet, HTTP, FTP and SSH. 2015 Article PeerReviewed Jama, Ahmed Yousuf and Sirat @ Md. Siraj, Maheyzah (2015) Survey on data modification attacks. International Journal Of Scientific And Engineering Research, 6 (2). pp. 778-781. ISSN 2229-5518 https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf. |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Jama, Ahmed Yousuf Sirat @ Md. Siraj, Maheyzah Survey on data modification attacks |
description |
One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up until now there are attacks that aim to penetrate the system and take advantages from that. Modification data attacks (MDA) can be malicious and cause huge damages to a system. MDA happens when attackers interrupt, capture, modify, steal or delete important information in the system via network access or direct access using executable codes. Most of recent modification, corruption attacks and worms still using known patterns as the control-data attack which are easy to be defeated by protection systems. But, non-control-data attacks can damage a vast applications, which always work with decision-making data, user input data, configuration data and user identity data. Therefore, in this survey we summarize and discuss important vulnerabilities to non-control data attacks in following applications which are Telnet, HTTP, FTP and SSH. |
format |
Article |
author |
Jama, Ahmed Yousuf Sirat @ Md. Siraj, Maheyzah |
author_facet |
Jama, Ahmed Yousuf Sirat @ Md. Siraj, Maheyzah |
author_sort |
Jama, Ahmed Yousuf |
title |
Survey on data modification attacks |
title_short |
Survey on data modification attacks |
title_full |
Survey on data modification attacks |
title_fullStr |
Survey on data modification attacks |
title_full_unstemmed |
Survey on data modification attacks |
title_sort |
survey on data modification attacks |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/60433/ https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf. |
_version_ |
1707765865440608256 |
score |
13.160551 |