View the step-by-step solution to:

Need a tutor to help reduce the similarity level in this document to 0 Types of attacks: 1. Active attack Some active attacks are spoofing attack,

Need a tutor to help reduce the similarity level in this document to 0

Types of attacks:

1. Active attack

Some active attacks are spoofing attack, Wormhole attack, Modification, Denial of services, Sinkhole, and Sybil


a. Spoofing

When a malicious node miss-present his identity, so that the sender change the topology

b. Modification

When malicious node performs some modification in the routing route, so that sender sends the message through

the long route. This attack cause communication delay occurred between sender and receiver.

c. Wormhole

This attack is also called the tunnelling attack. In this attack an attacker receives a packet at one point and tunnels it

to another malicious node in the network. So that a beginner assumes that he found the shortest path in the network

d. Fabrication

A malicious node generates the false routing message. This means it generate the incorrect information about the

route between devices.

e. Denial of services

In denial of services attack, malicious node sending the message to the node and consume the bandwidth of the

network. The main aim of the malicious node is to be busy the network node. If a message from unauthenticated

node will come, then receiver will not receive that message because he is busy and beginner has to wait for the

receiver response.

f. Sinkhole

Sinkhole is a service attack that prevents the base station from obtaining complete and correct information. In this

attack, a node tries to attract the data to it from his all neighbouring node. Selective modification, forwarding or

dropping of data can be done by using this attack.

g. Sybil

This attack related to the multiple copies of malicious nodes. The Sybil attack can be happen due to malicious node

shares its secret key with other malicious nodes. In this way the number of malicious node is increased in the

network and the probability of the attack is also increases. If we used the multipath routing, then the possibility of

selecting a path malicious node will be increased in the network.

2. Passive attack

The names of some passive attacks are traffic analysis, Eavesdropping, and Monitoring [1, 2, and 3].

a. Traffic analysis

In the traffic analysis attack, an attacker tries to sense the communication path between the sender and receiver. An

attacker can found the amount of data which is travel from the route of sender and receiver. There is no modification

in data by the traffic analysis.

b. Eavesdropping

This is a passive attack, which occurred in the mobile ad-hoc network. The main aim of this attack is to find out

some secret or confidential information from communication. This secrete information may be privet or public key

of sender or receiver or any secrete data.

c. Monitoring

In this attack in which attacker can read the confidential data, but he cannot edit the data or cannot modify the data.

3. Advance attacks

a. Black hole attack

Black hole attack is one of the advance attacking which attacker uses the routing protocol to advertise itself as

having the best path to the node whose packets it want to intercept. An hacker use the flooding based protocol for

listing the request for a route from the initiator, then hacker create a reply message he has the shortest path to the

receiver . As this message from the hacker reached to the initiator before the reply from the actual node, then

initiator wills consider that, it is the shortest path to the receiver. So that a malicious fake route is create.

506 Mohan V. Pawar and J. Anuradha / Procedia Computer Science 48 ( 2015 ) 503 - 506

b. Rushing attack

In rushing 3. Do not open the unknown or spam email without security.attack, when sender send packet to the receiver, then attacker alter the packet and forward to receiver. Attacker performs duplicate sends the duplicate to the receiver again and again. Receiver assumes that packets come from sender so the receiver becomes busy continuously.

c. Replay attack

It this attack a malicious node may repeat the data or delayed the data. This can be done by originator who intercept

the data and retransmit it. At that time, an attacker an intercept the password.

d. Byzantine attack

A set of intermediate node works between the sender and receiver and perform some changes such as creating

routing loops, sending packet through non optimal path or selectively dropping packet, which result in disruption or

degradation of routing services.

e. Location disclosure attack

Malicious node collects the information about the node and about the route by computing and monitoring the traffic.

So malicious node may perform more attack on the network.

Ways to prevent attacks:

It is hard to detect and prevent network attack once virus built and further we does not know the type of virus but we could prevent same if take some actions regarding that.

1. Chang your password frequently to prevent password hacking.

2. Take a backup of important files and programs regularly.

3. Do not open the unknown or spam email without security.

4. Use antivirus program to detect and prevent from the viruses.

5. Uses strong encryption to perform daily transaction on the web when you transfer your personal information, can use SSL (Digital Certificate) which being hard for intruders.

6. Using firewall, it is a machine between your system's network and internet that filtering the traffic which might be unsafe.

Recently Asked Questions

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.


Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question