Table 5 Table of malicious network attacks.

From: Network security analysis based on feature selection and optimized fireworks algorithm

Attack category

Impact

Principles

Local attacks

Grants unauthorized intruders operational privileges

Manipulates the host remotely through malicious code

Remote attacks

Illegal occupation of system resources

Elevates account privileges or steals account information through illicit means

DoS

Host is unable to perform operations or crashes

Floods the host with data, reaching storage or transmission limits

Eavesdropping attacks

Monitoring legitimate user operations

Attacks exploiting port vulnerabilities

Secret Attacks

Leakage of user privacy

Intercepts information and decodes keys

Man-in-the-middle attack (MITM)

Alters information transmitted between user and service

Intercepts and modifies communication between the user and the target server

Malware propagation

Spread of viruses or Trojan programs

Guides users to download malicious programs through emails or download links

Phishing attacks

Deceives users into entering sensitive information

Creates fake web pages to lure users into providing passwords and personal information