International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024
www.irjet.net
p-ISSN: 2395-0072
STUDY ON DIFFERENT TYPES OF CYBERCRIMES Nitya Modupalli 3rd year student, Dept. Of Computer science Engineering, Sir M Visvesvaraya Institute of Technology, Karnataka, India. ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The term "cybercrime" refers to illegal
public and private key, online banking and e-commerce websites are often the focus of Man-in-the-Middle (MitM) attacks, which allow attackers to obtain sensitive data such as login credentials. [5]
activities that aim to harm or steal data from a computer or network. Additionally, it covers the use of computers for illegal purposes, including as facilitating the trade or sale of illicit goods like narcotics or weapons online. [1] Cybercrime changes as technology does, figuring out ways to get around current security measures. Early versions first surfaced as email-based viruses and scams in the 1980s. The emergence of AI-powered phishing and social engineering, ransomware as a service (RaaS), commercial spyware, and extortionware are some of the current trends in cybercrime[2].And we must be aware of the security risks and breaches that occur, as well as how to protect ourselves against such cybercrimes. Key Words: Security breach, data, theft, cybercrime, malware, hacker.
1.INTRODUCTION What does a security breach entail? Any event that permits unauthorized access to computer data, applications, networks, or devices is referred to as a security breach. Unauthorized access to information results from this. It usually happens when an intruder manages to get past security measures. [3] The seven primary forms of security breaches are listed below:
Fig 1: Representation of how man in the middle attack works.
1. 2 DENIAL-OF-SERVICE ATTACK An attack known as a denial-of-service (DoS) aims to bring down a computer or network so that the intended users cannot use it. DoS attacks achieve this by transmitting information that causes a crash or by overloading the target with traffic. The denial of service or resource to legitimate users, such as employees, members, or account holders, is the result of a denial of service assault in both cases. DoS attack victims frequently target the web servers of well-known businesses, including banks, media, and commerce firms, as well as trade associations and governmental bodies. Even though DoS assaults seldom result in the loss or theft of important data or other assets, they can be extremely expensive and timeconsuming for the victim to deal with[6] DoS attacks typically fall in 2 categories:
1.1 MAN IN THE MIDDLE ATTACK An attacker who inserts himself into a communication between a user and an application with the intention of eavesdropping or pretending to be one of the parties and creating the impression that a regular information flow is taking place is known as a man in the middle (MITM) attack. The purpose of an attack is to obtain personal data, including credit card numbers, account information, and login credentials. Users of financial apps, SaaS companies, e-commerce websites, and other websites requiring logins are usually the targets. In general, a Man-in-the-Middle (MITM) attack can be compared to the mailman reading your bank statement, noting your account information, resealing the package, and having it delivered to your door.[4] How are MitM attacks conducted? Cybercriminals stoop down in the middle of internet communications or data exchanges during MiTM attacks. The attacker can easily access the user's web browser and the data it sends and receives during transactions by spreading malware. Due to their requirement for secure authentication using a
© 2024, IRJET
|
Impact Factor value: 8.226
|
Attacks using buffer overflow a kind of attack where a machine can run out of RAM, hard disk space, or CPU time due to a memory buffer overflow. This type of exploit frequently causes system crashes, sluggishness, or other harmful server behaviors, which leads to denial-ofservice. [7]
ISO 9001:2008 Certified Journal
|
Page 994