2019
DOI: 10.35444/ijana.2019.10051
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Network-based Security Attacks

Abstract: Cross Site Scripting, SQL Injection, Denial of Service (DOS), Buffer Overflow and Password Cracking are current network-based security attacks that still looms on the Internet. Though these attacks have been around for decades and there exist protective mechanism for overcoming them they are still relevant today. In this paper we describe the basic workings of these attacks and outline how companies and individuals can mitigate these attacks. By taking the necessary precautions the severity of these attacks ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…While sensing the frequency band of the SU, an individual sensing provide false detection due to couple of problems namely multipath fading and hidden terminal problems occurred in the wireless communication [20]. To overcome such problem statements, cooperative spectral sensing (CSS) has been introduced to detect the highly complicated problems and high prior for the security measures in the network [21].…”
Section: Introductionmentioning
confidence: 99%
“…While sensing the frequency band of the SU, an individual sensing provide false detection due to couple of problems namely multipath fading and hidden terminal problems occurred in the wireless communication [20]. To overcome such problem statements, cooperative spectral sensing (CSS) has been introduced to detect the highly complicated problems and high prior for the security measures in the network [21].…”
Section: Introductionmentioning
confidence: 99%
“…The Edge-Enhanced Video Streaming Taxonomy (EEVST) is a structured framework designed to provide a comprehensive overview of the myriad roles that edge computing plays within the video streaming landscape. This taxonomy aims to categorize and elucidate the diverse functionalities of edge computing, covering aspects such as content delivery, latency reduction, quality of service enhancement, security [6], user experience optimization, network efficiency, cost management, and integration with emerging technologies. EEVST serves as a valuable resource for industry professionals, researchers, and anyone interested in understanding how edge computing is redefining and improving the video streaming experience.…”
Section: Introductionmentioning
confidence: 99%