Survey on data modification attacks

One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up unti...

Full description

Saved in:
Bibliographic Details
Main Authors: Jama, Ahmed Yousuf, Sirat @ Md. Siraj, Maheyzah
Format: Article
Published: 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/60433/
https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf.
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.60433
record_format eprints
spelling my.utm.604332021-08-01T04:26:17Z http://eprints.utm.my/id/eprint/60433/ Survey on data modification attacks Jama, Ahmed Yousuf Sirat @ Md. Siraj, Maheyzah QA75 Electronic computers. Computer science One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up until now there are attacks that aim to penetrate the system and take advantages from that. Modification data attacks (MDA) can be malicious and cause huge damages to a system. MDA happens when attackers interrupt, capture, modify, steal or delete important information in the system via network access or direct access using executable codes. Most of recent modification, corruption attacks and worms still using known patterns as the control-data attack which are easy to be defeated by protection systems. But, non-control-data attacks can damage a vast applications, which always work with decision-making data, user input data, configuration data and user identity data. Therefore, in this survey we summarize and discuss important vulnerabilities to non-control data attacks in following applications which are Telnet, HTTP, FTP and SSH. 2015 Article PeerReviewed Jama, Ahmed Yousuf and Sirat @ Md. Siraj, Maheyzah (2015) Survey on data modification attacks. International Journal Of Scientific And Engineering Research, 6 (2). pp. 778-781. ISSN 2229-5518 https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf.
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Jama, Ahmed Yousuf
Sirat @ Md. Siraj, Maheyzah
Survey on data modification attacks
description One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up until now there are attacks that aim to penetrate the system and take advantages from that. Modification data attacks (MDA) can be malicious and cause huge damages to a system. MDA happens when attackers interrupt, capture, modify, steal or delete important information in the system via network access or direct access using executable codes. Most of recent modification, corruption attacks and worms still using known patterns as the control-data attack which are easy to be defeated by protection systems. But, non-control-data attacks can damage a vast applications, which always work with decision-making data, user input data, configuration data and user identity data. Therefore, in this survey we summarize and discuss important vulnerabilities to non-control data attacks in following applications which are Telnet, HTTP, FTP and SSH.
format Article
author Jama, Ahmed Yousuf
Sirat @ Md. Siraj, Maheyzah
author_facet Jama, Ahmed Yousuf
Sirat @ Md. Siraj, Maheyzah
author_sort Jama, Ahmed Yousuf
title Survey on data modification attacks
title_short Survey on data modification attacks
title_full Survey on data modification attacks
title_fullStr Survey on data modification attacks
title_full_unstemmed Survey on data modification attacks
title_sort survey on data modification attacks
publishDate 2015
url http://eprints.utm.my/id/eprint/60433/
https://www.ijser.org/researchpaper/Survey-on-Data-Modification-Attacks.pdf.
_version_ 1707765865440608256
score 13.160551