ABSTRACT

With continuing growth in the number of network users, the number of malicious network activities also keeps on increasing. As a consequence of security threats posed by such malicious activities, network systems are often compromised. Network attacks attempt to bypass security mechanisms of a target network by exploiting its vulnerabilities. An attacker usually attempts to disrupt a network system or a server by launching various types of attacks using attack tools. Today, one can easily download a sophisticated attack tool such as LOIC [196] or HOIC from the Web, and can disrupt a network system using such a tool.