Mixed threat attack

Source: Wikipedia, the free encyclopedia.

Regarding

spam or can be received by an Internet
download. Mixed threat attacks try to exploit multiple vulnerabilities to get into a system. By launching multiple diverse attacks in parallel, the attacker can exploit more entry points than with just a single attack.

Because these threats are based on multiple single-attacks, they are much harder to detect.

Intrusion Detection System is not able to detect the attack.[1]

Nimda and Code Red are examples of computer worms that utilized mixed threat attacks.[1]

See also

References

  1. ^ a b Trend Micro. "Enterprise Prevention and Management of Mixed-Threat Attacks" (PDF).