A Review on Various Sniffing Attacks and its Mitigation Techniques

Security in the era of digital computing plays a vital role. Of various attacks in the field of computing, Distributed Denial of service (DDoS) attacks, Man-in-the-Middle Attack (MITM) and data theft have their major impact on the emerging applications. The sniffing attacks, one of the most prominen...

Full description

Saved in:
Bibliographic Details
Main Authors: Prabadevi, B. (Author), Jeyanthi, N. (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2018-12-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02095 am a22003013u 4500
001 ijeecs10865_9956
042 |a dc 
100 1 0 |a Prabadevi, B.  |e author 
100 1 0 |e contributor 
700 1 0 |a Jeyanthi, N.  |e author 
245 0 0 |a A Review on Various Sniffing Attacks and its Mitigation Techniques 
260 |b Institute of Advanced Engineering and Science,   |c 2018-12-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10865 
520 |a Security in the era of digital computing plays a vital role. Of various attacks in the field of computing, Distributed Denial of service (DDoS) attacks, Man-in-the-Middle Attack (MITM) and data theft have their major impact on the emerging applications. The sniffing attacks, one of the most prominent reasons for DDoS attacks, are the major security threats in the client-server computing. The content or packet sniffer snorts the most sensitive information from the network and alters or disturbs the legitimate functionality of the victim system. Therefore it is extremely important to have a greater knowledge on these vulnerabilities, their issues, and various mitigation techniques. This study analyses the existing sniffing attacks, variations of sniffing attacks and prevention or detection mechanisms. The reasons for most vital Ransomware are also discussed. 
540 |a Copyright (c) 2018 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a DDoS; sniffing attack; Packet sniffing; MITM; Ransomware; DoS; 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 3: December 2018; 1117-1125 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10865/9956 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10865/9956  |z Get fulltext