Analysis of the Stages and Phases of Typical Network Attacks Based on Security Events
pdf (Georgian)

Keywords

Intrusion detection systems
Network intelligence
Hardening
Obfuscation
Malicious intent

How to Cite

Kartvelishvili, I., Okhanashvili, M., & Darchashvili, M. (2026). Analysis of the Stages and Phases of Typical Network Attacks Based on Security Events. International Scientific-Practical Conference: „Modern Challenges and Achievements in Information and Communication Technologies“ Transactions, 4, 410-415. https://papers.4science.ge/index.php/mcaaict/article/view/444

Abstract

The paper presents and analyzes the stages and phases of typical network attacks. Successful attacks on computer networks represent a rather complex sequence of actions pre-formed and prepared by the attacker. The implementation of an attack is often a multi-stage process, in which each stage is characterized by its own characteristics. Studying the "anatomy" of a computer attack allows us to assess the attacker's capabilities in carrying out malicious actions and also to develop an adequate protection system.

pdf (Georgian)

References

ქართველიშვილი ი., ოხანაშვილი მ., აბულაძე ი., ჩორხაული ნ.,დარჩაშვილი მ. ქსელური შეტევების აღმოჩენის არსებული სისტემების მიმოხილვა და ანალიზი. ასოციაცია მეცნიერებისათვის.Vol.6Issue3,2024.https://doi.org/10.52340/gs.2024.06.03.01

https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Birthday%20attack

https://www.checkpoint.com/cyber-hub/network-security/what-is-an-intrusion-detection-system-ids/ids-vs-ips/#