Professional Documents
Culture Documents
Assignment 1
Assignment 1
Jahangirnagar University
Assignment #1
____________________________________
Submitted By:
Name: Tasfia Israt
Roll:2027
Submitted To:
Dr. Risala Tasin Khan
Professor
IIT, JU
1
How many attacks are possible in a distributed system?
Distributed System:
A collection of linked computers operating as a single unit is called a distributed system. These
gadgets—sometimes referred to as nodes—work together and exchange data to accomplish
objectives. Distributed systems have issues related to communication, synchronization, and
security in addition to benefits like improved fault tolerance, scalability, and performance.
There is a big attack surface on a distributed system, differ based on its components, weaknesses,
and structure. Distributed systems are susceptible to a variety of attacks.
Different Attack Types for Distributed Systems:
2. Man-in-the-Middle (MitM):
This may lead to unlawful access to information or the redirection of legitimate traffic.To
manipulate data, listen in on conversations, or assume the identity of someone else,
cybercriminals take advantage of weaknesses in the communication path.
3. DNS Spoofing:
DNS spoofing is the deception of people by using the Domain Name System (DNS) to trick them
into visiting certain websites or services.
Hacked DNS servers could be used by attackers. Users can be directed to rogue nodes by
injecting DNS records into a decentralized network. Information may be accessed by
unauthorized parties or lawful traffic may be diverted as a result."
4. Data Breach:
Data breach happens when unauthorized individuals’ access a stored map or database with
sensitive or private information. It might concern business data, intellectual property, or personal
2
information. They become risks that individuals and businesses might confront should there be
data loss.
5. Phishing:
Phishing attempted use various methods to lure the victim in divulging their personal details,
even confidential stuffs like bank account information, username, and password. The fraudsters’
parasite explore the use of fake mails, messages, or even unofficial sites that mimic well-known
businesses for their reasons.
6. Malware:
Under the terms of malware, a wide variety of hostile programs, including viruses, worms,
trojans, ransomware, etc., becomes feasible. The goal of a majority of these programs is either to
compromise computer security or tamper with data. The hackers may also obtain illegal access.
7. Eavesdropping:
Eavesdropping attacks aim to obtain information from phone or computer conversations without
the parties' awareness. Cybercriminals may be able to listen in on and intercept data
transmissions in order to get unauthorized access to sensitive information.
8. Session Hijacking:
The act of interrupting user's ongoing session and walking away with their right over it are all
referred to as session hijacking, session stealing, or session sid jacking.
Hackers may find a way to penetrate distributed systems using vulnerabilities that cause user
authentication errors to occur, which would help them to pretend they are legit users and to
obtain unauthorized access to services or applications.
3
10. Blockchain-specific Attacks:
Hacking of blockchain aimed at paralyzing the distributed nature and the feature which is
chained among blockchain networks.
Attacks such as double spend could be putting on flaws of the dispersed ledger systems like
blockchain, as such unwanted mechanism could provide the circumstance for the same
cryptocurrency being spent more than once and subsequently put blockchain's integrity at risk.
These illustrations highlight the wide variety of risks that can impact distributed systems,
highlighting the necessity of thorough security protocols and ongoing observation to guard
against changing cyberthreats.