The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures
Glory V. Umoh, Nnamnso P. Paul
Abhishek Maity, Sayan Dasgupta, Debjit Paul "The Adverse Effect of Watering Hole Attack in Distributed Systems and the Preventive Measures". International Journal of Computer Trends and Technology (IJCTT) V23(4):162-165, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
This paper focuses on a simple, yet impactful
crimes that occurs in the virtual world as opposed to
physical attack such as war, that may lead to system
crash if not notice on-time. It describes the Watering
Hole technique and how it works; this technique is
used in targeted attacks that aim to gather confidential
information and intelligence from organisation,
identifying the attack and what impact it creates. In
addition, the Watering Hole Attack (WHA) is very
effective, so we find preventive measures of
terminating it, so that it will not invade the system.
References
[1] B. Donohue, " Watering Hole Attack Targets Automotive,
Aerospace Industries", September 2014
[2] Internet Explorer Zero-Day Used in Watering Hole Attack: Q&A,
Symantec Security Response Symantec Employee, Dec 2012.
[3] M. Michael., " Why Watering Hole Attacks Work ", March 2013.
Available: https://threatpost.com/why-watering-hole-attackswork-
032013/77647#sthash.8WthZOip.dpuf.
[4] New Internet Explorer 10 Zero-Day Discovered in Watering Hole
Attack, Symantec Security Response Symantec Employee, Feb
2014 .
[5] O, Robert., " Watering Hole Attacks: Tips on outsmarting Hackers
", May 2014.
[6] W. Gragido, "Lions at the Watering Hole – The "VOHO" Affair",
The RSA Blog, EMC Corporation, July 2012.
[7] A. S. Tanenbaum and M. V. Steen, "Distributed Systems:
Principles and Paradigms", 3rd ed., Prentice Hall Press, 2013.
Keywords
Hacking , cracking, threat, victim, zero-day
attack.