Endpoint Attacks
Malware Attacks
Goal: Imprison
Goal: Launch
File-based virus
- Appender infection
- Armored file-based virus
- Split infection
- Mutation
Fileless virus
Worm
Bot or Zombie
Goal: Snoop
Goal: Deceive
- Potentially Unwanted Programs
- Trojans
- Remote Access Trojans
Goal: Evade
- Backdoor
- Logic Bomb
- Rootkit
Application Attacks
Scripting
Injection
- SQL injection
- SML injection
Request forgery
Replay
Attacks on Software
- Memory vulnerabilities
- Improper exception and error handling
- External software components
Adversarial Artificial Intelligence Attacks