This paper explores the most fatal attacks that might cause serious downtime to an enterprise network and examines practical approaches to understand the behavior of the attacks and devise effective mitigation techniques. It also describes the importance of security policies and how security policies are designed in real world. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 9, SEPTEMBER 2014, 298–307 Available online at: ISSN 2308-9830 N C S A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques UMME SALSABIL1, M. TANSEER ALI2, MD. MANIRUL ISLAM3 1 2 3 Graduate Student, Faculty of Engineering, American International University-Bangladesh Assistant Professor, Faculty of Engineering, American International University-Bangladesh Assistant Professor, Faculty of Science and IT, American International University-Bangladesh E-mail: 1salsabil@, 2tanseer@, 3manirul@ ABSTRACT For any organization, having a secured network is the primary thing to reach their business requirements. A network is said to be secured when it can sustain from attacks, which may damage the whole network. Over the last few decades, internetworking has grown tremendously and lot of importance is given to secure the network. To develop a secure network, network administrators must have a good understanding of all attacks that are caused by an intruder and their mitigation techniques. This paper explores the most fatal attacks that might cause serious downtime to an enterprise network and examines practical approaches to understand the behavior of the attacks and devise effective mitigation techniques. It also describes the importance of security policies and how security policies are designed in real world. Keywords: DoS Attack, ARP Spoofing, Evil Twin Attack, Man-in-the-middle Attack, DHCP Starvation. 1 INTRODUCTION The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected.