Explore chapters and articles related to this topic
Attacking Smartphone Security and Privacy
Published in Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos, Intrusion Detection and Prevention for Mobile Ecosystems, 2017
Vincent F. Taylor, Ivan Martinovic
On the local network segment, smartphones are susceptible to the typical spoofing attacks that traditional workstations are also susceptible to. With ARP spoofing [69,70], the attacker convinces the victim device that it is the gateway. The same principle applies for DNS [67] and DHCP spoofing [68] attacks. In DNS spoofing, the attacker responds to the victim's DNS queries. Usually, the responses point a domain name to an IP address under the control of the attacker. By doing this, the attacker receives traffic from the victim that was intended for a different recipient. Similarly, with DHCP spoofing, the attacker responds with false DHCP responses, usually telling the victim to use the attacker's IP address as a default gateway. Once again, this tricks the victim into sending their traffic to the attacker. Once the attacker receives the traffic, they are free to inspect, modify, and/or forward the packets to some destination.
Defending Web Applications Against JavaScript Worms on Core Network of Cloud Platforms
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
Shashank Tripathi, Pranav Saxena, Harsh D. Dwivedi, Shashank Gupta
DNS Server Spoofing: Domain Name Server (DNS) maps domain name with IP addresses. When the user enters the website address into the browser, it is the responsibility of the DNS to resolve that domain name address into IP address of the server. In DNS spoofing attack, the attacker changes entries in the DNS server, so that when user enters the particular website address, it gets redirected to another IP address that generally belongs to attacker or it also can be related to the victim to which the attacker may want to flood the traffic. Attacker may reply to these messages with malicious programs that are sent to harm the victim’s computer.
Policy-based security for distributed manufacturing execution systems
Published in International Journal of Computer Integrated Manufacturing, 2018
Octavian Morariu, Cristina Morariu, Theodor Borangiu
The main challenge with wireless network security is represented by the simplified nature of network access, in contrast with wired networks. In the context of wired networking, one must gain access to the facility to physically connect to the internal network. With Wi-Fi networks, the attacker only needs to be within the wireless range of the Wi-Fi network in order to be able to attempt an attack. Wi-Fi implementations for sensitive networks usually employ techniques to prevent unauthorised access to the network and at the same time to encrypt the data sent through the network. However, an attacker who has managed to access Wi-Fi network router can initiate a large range of attacks. For example a DNS spoofing attack against any other device in the network is possible by sending a response before the queried DNS server has a chance to reply.