{"id":357,"date":"2025-06-26T15:16:00","date_gmt":"2025-06-26T19:16:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ashleyharper\/?p=357"},"modified":"2025-06-26T15:16:00","modified_gmt":"2025-06-26T19:16:00","slug":"write-up-exploring-attacks-on-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ashleyharper\/2025\/06\/26\/write-up-exploring-attacks-on-availability\/","title":{"rendered":"Write Up: Exploring Attacks on Availability"},"content":{"rendered":"\n<p>22 June 2025<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">In this assignment, you will\u00a0research and analyze\u00a0different types of cyberattacks that target the availability of systems, networks, or data, which is one of the core principles of cybersecurity. Known as &#8220;Attacks on Availability,&#8221; these are incidents where malicious actors attempt to disrupt access to critical resources, making them inaccessible to users. Such attacks can include Distributed Denial of Service (DDoS), ransomware, and other forms that focus on hindering legitimate access.<\/h3>\n\n\n\n<p><em>Cyberattacks have become the biggest issue in the world of technology. Identifying different types of cyberattacks and how they are happening is crucial to understanding and preventing them. However, some criminals have become intelligent in creating quick and simple attacks.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Attack on Availability<\/h3>\n\n\n\n<p>Attack on availability is defined by an article as a form of data poisoning that changes the training data of machine learning modules (Yu et. al., 2022). These modules begin to have the inability to properly learn the data thus making the data unavailable. The attack made this possible by creating a shortcut for the module to learn. However, the shortcut was simple and contained a slight change so that the learning of the real data became obsolete (Yu et. al., 2022). The authors found that these changes are \u201clinearly separable\u201d, meaning that the changes formed a simple pattern that could be easily identified with a linear (straight) plane. This is visible using a 2-d visual program, T-SNE, which shows the clusters of data. They could separate the data points into different labels and were able to identify the poisoned data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Types of Cyberattacks<\/h3>\n\n\n\n<p>There are many methods of cyberattacks used today. One attack is called \u201cSocial Engineering Attack\u201d where the attacker targets vulnerable individuals through manipulation tactics to reveal personal information. This is common with the elderly and those with little understanding or usage of technology. \u201cComputer Network Attacks\u201d are done through the attacker \u201cmanipulating, corrupting, rejecting, and destroying information in computers and computer networks in order to gain control of the computer\/computer network\u201d (Aslan et. al., 2023. 23). A final example, \u201cbots and botnets\u201d, is a software program that has learned to mimic human behaviors or other information through the repetition of tasks. While they are used for some positive instances, like customer service lines, the negative instances include taking control of computers, sending spam, infiltrating accounts, etc. (Aslan et. al., 2023).<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Common Technique Used in Attacks<\/h3>\n\n\n\n<p>One of the most common types of attacks to this day is identified as \u201cphishing attacks\u201d. This is online fraud committed by scammers who are sending emails, or other forms of messages, identifying themselves as a well-known source (Aslan et. al., 2023). This could be your specific bank or government agencies. The goal is for the scammer to use the manipulation tactics similar to those in social engineering attacks to convince the victim to give out sensitive information. Personally, I had a text message very recently stating that I had an outstanding parking fee and I was to pay the DMV immediately. The sender\u2019s fake email address was listed as their name. There was a link attached to the bottom of the message after claiming my license will be suspended or no longer valid if I do not pay. This is a prime example of phishing. If I had clicked that link, the attacker may have been able to access my information from my phone. The government agencies will never send text messages demanding money. However, there are going to be vulnerable victims who are scared into complying with these messages, unknowingly giving the individual access to their personal information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Conclusion<\/h3>\n\n\n\n<p>In conclusion, cyberattacks have become a daily issue in the world of technology. Individuals need to be educated to learn the potential dangers of the internet world and how to avoid being the next victim. Organizations are also in danger of their data having been tampered with for malicious intent. While eradicating cyberattacks is near impossible, it is still important to identify and respond to these attacks as soon as possible to prevent any more damage that had been done.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">References<\/h3>\n\n\n\n<p>Aslan, \u00d6., Aktu\u011f, S. S., Ozkan-Okay, M., Yilmaz, A. A., &amp; Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. <em>Electronics<\/em>, <em>12<\/em>(6), 1333. https:\/\/doi.org\/10.3390\/electronics12061333<\/p>\n\n\n\n<p>Yu, D., Zhang, H., Chen, W., Yin, J., &amp; Liu, T. Y. (2022, August). Availability attacks create shortcuts. In <em>Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining<\/em> (pp. 2367-2376).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>22 June 2025 In this assignment, you will\u00a0research and analyze\u00a0different types of cyberattacks that target the availability of systems, networks, or data, which is one of the core principles of cybersecurity. Known as &#8220;Attacks on Availability,&#8221; these are incidents where malicious actors attempt to disrupt access to critical resources, making them inaccessible to users. Such&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ashleyharper\/2025\/06\/26\/write-up-exploring-attacks-on-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":30937,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/posts\/357"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/users\/30937"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/posts\/357\/revisions\/358"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}