banner



In Which Type Of Attack Does The Attacker Try To Alter Or Corrupt The Data Or Services On A Network?

Active attacks: An Active attack attempts to alter system resources or bear upon their operations. Active attacks involve some modification of the data stream or the creation of false statements. Types of active attacks are as follows:

  • Masquerade
  • Modification of messages
  • Repudiation
  • Replay
  • Denial of Service

Masquerade –

A masquerade attack takes place when one entity pretends to be a dissimilar entity. A Masquerade assault involves one of the other forms of active attacks.  If an authorization procedure isn't e'er admittedly protected, it is able to grow to be extraordinarily liable to a masquerade assault. Masquerade assaults may be performed using the stolen passwords and logins, with the assist of using finding gaps in programs, or with the assist of using locating a manner across the authentication process.

Masquerade Attack

Masquerade Assail

Modification of messages –

It means that some portion of a bulletin is altered or that bulletin is delayed or reordered to produce an unauthorized effect. Modification is an assault on the integrity of the original data. It basically ways that unauthorized parties non merely proceeds access to data but also spoof the data past triggering denial-of-service attacks, such every bit altering transmitted data packets or flooding the network with fake data. Manufacturing is an assault on hallmark. For example, a message significant "Allow JOHN to read confidential file X" is modified as "Permit Smith to read confidential file X".

Modification of messages

Modification of messages

Repudiation –

This attack occurs when the network is not completely secured or the login control has been tampered with. With this attack, the author's data tin can exist changed by actions of a malicious user in social club to save simulated data in log files, upwardly to the general manipulation of data on behalf of others,  similar to the spoofing of electronic mail messages.

Replay –

Information technology involves the passive capture of a message and its subsequent transmission to produce an authorized effect. In this attack, the bones aim of the attacker is to save a re-create of the data originally nowadays on that particular network and later on use this data for personal uses. Once the data is corrupted or leaked it is insecure and dangerous for the users.

Replay

Replay

Deprival of Service –

It prevents the normal use of communication facilities. This assault may have a specific target. For case, an entity may suppress all messages directed to a particular destination. Another form of service deprival is the disruption of an entire network either by disabling the network or by overloading information technology with messages so every bit to degrade performance.

Denial of Service

Denial of Service

Passive attacks: A Passive attack attempts to larn or make employ of information from the system but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or monitoring transmission. The goal of the opponent is to obtain information that is beingness transmitted. Types of Passive attacks are as follows:

  • The release of message content
  • Traffic analysis

The release of bulletin content –

Telephonic conversation, an electronic mail message, or a transferred file may incorporate sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.

Passive attack

Passive assault

Traffic analysis –

Suppose that we had a fashion of masking (encryption) information, then that the attacker even if captured the message could not extract any information from the message.
The opponent could make up one's mind the location and identity of communicating host and could observe the frequency and length of letters being exchanged. This data might be useful in guessing the nature of the communication that was taking place.
The almost useful protection against traffic analysis is encryption of SIP traffic. To do this, an attacker would have to access the SIP proxy (or its call log) to determine who fabricated the call.

Traffic analysis

Traffic analysis

Source: https://www.geeksforgeeks.org/active-and-passive-attacks-in-information-security/

Posted by: goodwinbutenway.blogspot.com

0 Response to "In Which Type Of Attack Does The Attacker Try To Alter Or Corrupt The Data Or Services On A Network?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel