TY - GEN
T1 - Comprehensive Analysis of Various Cyber Attacks
AU - Kavya Rani, S. R.
AU - Soundarya, B. C.
AU - Gururaj, H. L.
AU - Janhavi, V.
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - Cyber attacks are malevolent undertakings to damage, take or destroy fundamental corporate data, compromise locales, and upset practical establishments. The aggressor misuses shortcomings in the structure, acquainting a harmful code with adjust PC code, reasoning, or data inciting cybercrimes, similar to information and discount misrepresentation. As associations and the clients, they serve have come to depend upon locales and electronic applications to make, eat up, and cooperate, the insurance and security threats to which they are revealed every day are growing significantly. Cyber attacks have gotten logically refined and risky. They are as of now not put something aside for high profile targets and can impact any affiliation that relies upon orchestrated applications, devices, and systems. Government associations and monetary firms stay the focal point of numerous cyber attacks, especially those completed for the sake of hacktivism. Be that as it may, because of the open foundation of the Internet and the expanded accessibility of simple to-execute assault devices, nearly anybody with the essential abilities can do a cyber attack. This paper focuses on comprehensive analysis of various cyber-attacks. The analysis of cyber-attack is done using kali Linux. Many tools that are present in the kali Linux are being explored in this paper.
AB - Cyber attacks are malevolent undertakings to damage, take or destroy fundamental corporate data, compromise locales, and upset practical establishments. The aggressor misuses shortcomings in the structure, acquainting a harmful code with adjust PC code, reasoning, or data inciting cybercrimes, similar to information and discount misrepresentation. As associations and the clients, they serve have come to depend upon locales and electronic applications to make, eat up, and cooperate, the insurance and security threats to which they are revealed every day are growing significantly. Cyber attacks have gotten logically refined and risky. They are as of now not put something aside for high profile targets and can impact any affiliation that relies upon orchestrated applications, devices, and systems. Government associations and monetary firms stay the focal point of numerous cyber attacks, especially those completed for the sake of hacktivism. Be that as it may, because of the open foundation of the Internet and the expanded accessibility of simple to-execute assault devices, nearly anybody with the essential abilities can do a cyber attack. This paper focuses on comprehensive analysis of various cyber-attacks. The analysis of cyber-attack is done using kali Linux. Many tools that are present in the kali Linux are being explored in this paper.
UR - http://www.scopus.com/inward/record.url?scp=85123837675&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85123837675&partnerID=8YFLogxK
U2 - 10.1109/MysuruCon52639.2021.9641089
DO - 10.1109/MysuruCon52639.2021.9641089
M3 - Conference contribution
AN - SCOPUS:85123837675
T3 - 2021 IEEE Mysore Sub Section International Conference, MysuruCon 2021
SP - 255
EP - 262
BT - 2021 IEEE Mysore Sub Section International Conference, MysuruCon 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1st IEEE Mysore Sub Section International Conference, MysuruCon 2021
Y2 - 24 October 2021 through 25 October 2021
ER -