1st unit
1st unit
UNIT – 1
Active attacks:
it involve some modification of the data stream or the creation of false
data.
Unlike passive attacks, active attacks can often be detected but are
harder to completely prevent due to their aggressive nature.
Categories of active attacks include:
Masquerade Attack: In this type, an attacker pretends to be another
legitimate entity to gain unauthorized access. This is often achieved by
stealing login credentials or using spoofed identities.
Replay Attack: involve capturing legitimate data transmissions and
retransmitting them to produce unauthorized effects.Replay attacks can
be used to bypass login processes or repeat financial transactions.
Modification of Messages: This involves changing the content of a
legitimate message to produce an undesired effect. The modification
could involve altering permissions, redirecting information, or inserting
false data. This type of attack affects the integrity of information.
Denial of Service (DoS): This attack aims to make a system or service
unavailable to legitimate users. It may involve flooding a server with
traffic, exploiting vulnerabilities to crash systems, or consuming all
available resources. Distributed DoS (DDoS) attacks are a more powerful
version, launched from multiple compromised systems.
Active attacks are generally easier to detect because they leave behind
evidence such as system crashes, service interruptions, or data
inconsistencies. However, preventing them completely is challenging
without comprehensive security controls.