Active Attacks:Also have “active attacks” which attempt to alter system resources or affect their operation.
By modification of data stream to:
+ masquerade of one entity as some other
+ replay previous messages (as shown above in Stallings Figure 1.4b)
+ modify messages in transit
+ denial of service
Active attacks present the opposite characteristics of passive attacks. Whereas passive attacks are difficult to detect, measures are available to prevent their success. On the other hand, it is quite difficult to prevent active attacks absolutely, because of the wide variety of potential physical,software,and network vulnerabilities. Instead, the goal is to detect active attacks and to recover from any disruption or delays caused by them.
- Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service.
No comments:
Post a Comment