ABSTRACT

This chapter discusses the security attacks with respect to current and future Internet architecture. It presents various threats for a networking environment as well as some threats that are specific to networks based on Internet Protocol such as spoofing and sniffing. The threats directly effect the fundamental principles like confidentiality, integrity availability of security. There are four categories of attacks which we might face are Interception, Interruption, Modification and fabrication attack. Availability of resources will be in danger due to interruption attack. Applications often grant excessive access to resources, allowing unprivileged users excessive access or imposing inadequate control to prevent the corruption or loss of data. Open design issues allow free use of application resources by unintended parties Backdoors and application design flaws bypass standard security controls. Overly complex application security controls tend to be bypassed or poorly understood and implemented.