Universiti Teknologi Malaysia Institutional Repository

Survey on data modification attacks

Jama, Ahmed Yousuf and Sirat @ Md. Siraj, Maheyzah (2015) Survey on data modification attacks. International Journal Of Scientific And Engineering Research, 6 (2). pp. 778-781. ISSN 2229-5518

Full text not available from this repository.

Official URL: https://www.ijser.org/researchpaper/Survey-on-Data...

Abstract

One of the challenging areas in computer science is to keep the data and information safe and assure. Due to very tight competition and sensitive data for the owner although they spend billions of dollars annually to make sure there are no threats or vulnerabilities against their assets, but up until now there are attacks that aim to penetrate the system and take advantages from that. Modification data attacks (MDA) can be malicious and cause huge damages to a system. MDA happens when attackers interrupt, capture, modify, steal or delete important information in the system via network access or direct access using executable codes. Most of recent modification, corruption attacks and worms still using known patterns as the control-data attack which are easy to be defeated by protection systems. But, non-control-data attacks can damage a vast applications, which always work with decision-making data, user input data, configuration data and user identity data. Therefore, in this survey we summarize and discuss important vulnerabilities to non-control data attacks in following applications which are Telnet, HTTP, FTP and SSH.

Item Type:Article
Uncontrolled Keywords:data modification attacks, non-control data attacks, survey
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:60433
Deposited By: Haliza Zainal
Deposited On:24 Jan 2017 02:54
Last Modified:01 Aug 2021 04:26

Repository Staff Only: item control page