Need a tutor to help reduce the similarity level in this document to 0
Types of attacks:
1. Active attack
Some active attacks are spoofing attack, Wormhole attack, Modification, Denial of services, Sinkhole, and Sybil
When a malicious node miss-present his identity, so that the sender change the topology
When malicious node performs some modification in the routing route, so that sender sends the message through
the long route. This attack cause communication delay occurred between sender and receiver.
This attack is also called the tunnelling attack. In this attack an attacker receives a packet at one point and tunnels it
to another malicious node in the network. So that a beginner assumes that he found the shortest path in the network
A malicious node generates the false routing message. This means it generate the incorrect information about the
route between devices.
e. Denial of services
In denial of services attack, malicious node sending the message to the node and consume the bandwidth of the
network. The main aim of the malicious node is to be busy the network node. If a message from unauthenticated
node will come, then receiver will not receive that message because he is busy and beginner has to wait for the
Sinkhole is a service attack that prevents the base station from obtaining complete and correct information. In this
attack, a node tries to attract the data to it from his all neighbouring node. Selective modification, forwarding or
dropping of data can be done by using this attack.
This attack related to the multiple copies of malicious nodes. The Sybil attack can be happen due to malicious node
shares its secret key with other malicious nodes. In this way the number of malicious node is increased in the
network and the probability of the attack is also increases. If we used the multipath routing, then the possibility of
selecting a path malicious node will be increased in the network.
2. Passive attack
The names of some passive attacks are traffic analysis, Eavesdropping, and Monitoring [1, 2, and 3].
a. Traffic analysis
In the traffic analysis attack, an attacker tries to sense the communication path between the sender and receiver. An
attacker can found the amount of data which is travel from the route of sender and receiver. There is no modification
in data by the traffic analysis.
This is a passive attack, which occurred in the mobile ad-hoc network. The main aim of this attack is to find out
some secret or confidential information from communication. This secrete information may be privet or public key
of sender or receiver or any secrete data.
In this attack in which attacker can read the confidential data, but he cannot edit the data or cannot modify the data.
3. Advance attacks
a. Black hole attack
Black hole attack is one of the advance attacking which attacker uses the routing protocol to advertise itself as
having the best path to the node whose packets it want to intercept. An hacker use the flooding based protocol for
listing the request for a route from the initiator, then hacker create a reply message he has the shortest path to the
receiver . As this message from the hacker reached to the initiator before the reply from the actual node, then
initiator wills consider that, it is the shortest path to the receiver. So that a malicious fake route is create.
506 Mohan V. Pawar and J. Anuradha / Procedia Computer Science 48 ( 2015 ) 503 - 506
b. Rushing attack
In rushing 3. Do not open the unknown or spam email without security.attack, when sender send packet to the receiver, then attacker alter the packet and forward to receiver. Attacker performs duplicate sends the duplicate to the receiver again and again. Receiver assumes that packets come from sender so the receiver becomes busy continuously.
c. Replay attack
It this attack a malicious node may repeat the data or delayed the data. This can be done by originator who intercept
the data and retransmit it. At that time, an attacker an intercept the password.
d. Byzantine attack
A set of intermediate node works between the sender and receiver and perform some changes such as creating
routing loops, sending packet through non optimal path or selectively dropping packet, which result in disruption or
degradation of routing services.
e. Location disclosure attack
Malicious node collects the information about the node and about the route by computing and monitoring the traffic.
So malicious node may perform more attack on the network.
Ways to prevent attacks:
It is hard to detect and prevent network attack once virus built and further we does not know the type of virus but we could prevent same if take some actions regarding that.
1. Chang your password frequently to prevent password hacking.
2. Take a backup of important files and programs regularly.
3. Do not open the unknown or spam email without security.
4. Use antivirus program to detect and prevent from the viruses.
5. Uses strong encryption to perform daily transaction on the web when you transfer your personal information, can use SSL (Digital Certificate) which being hard for intruders.
6. Using firewall, it is a machine between your system's network and internet that filtering the traffic which might be unsafe.
Recently Asked Questions
- In conducting a one-way analysis of variance where the test statistic is less than the critical value, which of the following is correct? a) Conclude that the
- Give some examples of what is happening to sea ice and glacial ice. Why is this occurring? What are the possible human impacts and vice versa? In reference to
- how do you find the axis of symmetry symbolically?