Author_Institution :
Core Security Technol., Boston, MA, USA
Abstract :
We can build an entire taxonomy of attacks on network security by understanding exploitation programs, which take advantage of bugs in software running on vulnerable systems, these programs´ technical capabilities and their connection to those who develop and use them. For the past decade, exploit tools have signaled the evolution of a community of adversaries comprising numerous inexperienced and unskilled attackers commonly referred to as script kiddies, and a few experienced, technically savvy attackers. Exploit programs are tell-tale signs of attackers´ sophistication: if studied meticulously, they can provide insight into current and future trends.
Keywords :
computer network management; invasive software; telecommunication security; attack taxonomy; exploit tools; exploitation programs; future trends; network security; script kiddies; shellcode; Computer bugs; Computer security; Computer worms; Extremities; Information security; Payloads; Privacy; Software packages; Springs; Weapons; attack; exploitation program; exploits; taxonomy of attacks;