Mixed threat attack
This article needs additional citations for verification. (December 2009) |
Regarding
spam or can be received by an Internet
download. Mixed threat attacks try to exploit multiple vulnerabilities to get into a system. By launching multiple diverse attacks in parallel, the attacker can exploit more entry points than with just a single attack.
Because these threats are based on multiple single-attacks, they are much harder to detect.
Intrusion Detection System is not able to detect the attack.[1]
Nimda and Code Red are examples of computer worms that utilized mixed threat attacks.[1]
See also
References
- ^ a b Trend Micro. "Enterprise Prevention and Management of Mixed-Threat Attacks" (PDF).