Table 5 Table of malicious network attacks.
From: Network security analysis based on feature selection and optimized fireworks algorithm
Attack category | Impact | Principles |
|---|---|---|
Local attacks | Grants unauthorized intruders operational privileges | Manipulates the host remotely through malicious code |
Remote attacks | Illegal occupation of system resources | Elevates account privileges or steals account information through illicit means |
DoS | Host is unable to perform operations or crashes | Floods the host with data, reaching storage or transmission limits |
Eavesdropping attacks | Monitoring legitimate user operations | Attacks exploiting port vulnerabilities |
Secret Attacks | Leakage of user privacy | Intercepts information and decodes keys |
Man-in-the-middle attack (MITM) | Alters information transmitted between user and service | Intercepts and modifies communication between the user and the target server |
Malware propagation | Spread of viruses or Trojan programs | Guides users to download malicious programs through emails or download links |
Phishing attacks | Deceives users into entering sensitive information | Creates fake web pages to lure users into providing passwords and personal information |