Cyber attacks on financial critical infrastructures

4Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter focuses on attack strategies that can be (and have been) used against financial IT infrastructures. The first section presents an overview and a classification of the different kinds of frauds and attacks carried out against financial institutions and their IT infrastructures. We then restrict our focus by analyzing in detail five attack scenarios, selected among the ones presented in the previous section. These attack scenarios are: Man in the Middle (and its variant, Man in the Browser), distributed denial of service (DDoS), distributed portscan, session hijacking, and malware-based attacks against Internet banking customers. These scenarios have been selected because of their distributed nature: All of them involve multiple, geographically distributed financial institutions. Hence their detection will benefit greatly from the deployment of new technologies and best practices for information sharing and cooperative event processing. For each scenario we present a theoretical description of the attack as well as implementation details and consequences of past attacks carried out against real financial institutions.

Cite

CITATION STYLE

APA

Marchetti, M., Colajanni, M., Messori, M., Aniello, L., & Vigfusson, Y. (2012). Cyber attacks on financial critical infrastructures. In Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware (pp. 53–82). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-20420-3_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free