Attack:
An attack is nothing but that disrupts the normal network operation.
1.Passive attacks are those, launched by the adversaries solely to snoop the data exchanged in the network. These adversaries in any way don’t disturb the operation of the network. Such attacks identification becomes very difficult since network itself does not affected and they can reduced by using powerful encryption techniques
Example: Snooping, eavesdropping, traffic analysis, monitoring
2.Active attack tries to alter or destroy the information that is being exchanged, thereby disturbing the normal functionality of the network.
Example:Wormhole, black hole, gray hole, byzantine, information
disclosure, resource consumption, routing attacks
No comments:
Post a Comment