Before initiating the actual attack, it is applied to get information about a target machine such as available services and opening ports. For this purpose, the attackers use different scanning tools such as nessus [28]
Distributed denial of service (DDoS)
It is a flooding attack where an intruder usually initiates a series of malicious attempts to exhaust the system resources
Ransomware
It is a complex type of malware that disallows legitimate users’ access to services or systems through encryption. The attacker tries to sell the decryption key to the access system