The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-4
Year of Publication : 2015
Authors : Glory V. Umoh, Nnamnso P. Paul
  10.14445/22312803/IJCTT-V23P133

MLA

Glory V. Umoh, Nnamnso P. Paul

Abhishek Maity, Sayan Dasgupta, Debjit Paul "The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures". International Journal of Computer Trends and Technology (IJCTT) V23(4):162-165, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
This paper focuses on a simple, yet impactful crimes that occurs in the virtual world as opposed to physical attack such as war, that may lead to system crash if not notice on-time. It describes the Watering Hole technique and how it works; this technique is used in targeted attacks that aim to gather confidential information and intelligence from organisation, identifying the attack and what impact it creates. In addition, the Watering Hole Attack (WHA) is very effective, so we find preventive measures of terminating it, so that it will not invade the system.

References
[1] B. Donohue, " Watering Hole Attack Targets Automotive, Aerospace Industries", September 2014
[2] Internet Explorer Zero-Day Used in Watering Hole Attack: Q&A, Symantec Security Response Symantec Employee, Dec 2012.
[3] M. Michael., " Why Watering Hole Attacks Work ", March 2013. Available: https://threatpost.com/why-watering-hole-attackswork- 032013/77647#sthash.8WthZOip.dpuf.
[4] New Internet Explorer 10 Zero-Day Discovered in Watering Hole Attack, Symantec Security Response Symantec Employee, Feb 2014 .
[5] O, Robert., " Watering Hole Attacks: Tips on outsmarting Hackers ", May 2014.
[6] W. Gragido, "Lions at the Watering Hole – The "VOHO" Affair", The RSA Blog, EMC Corporation, July 2012.
[7] A. S. Tanenbaum and M. V. Steen, "Distributed Systems: Principles and Paradigms", 3rd ed., Prentice Hall Press, 2013.

Keywords
Hacking , cracking, threat, victim, zero-day attack.