0% found this document useful (0 votes)
48 views6 pages

Assignment ON Cryptography & Network Security

The document discusses different types of network attacks, including active and passive attacks. Active attacks modify or forge network packets and include masquerading, replaying, and denial of service attacks. Passive attacks involve unauthorized monitoring of communications without modification and include releasing message contents and traffic analysis. Masquerading involves assuming another entity's identity, while traffic analysis involves analyzing patterns in network traffic to draw conclusions about communications.

Uploaded by

Krisna Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views6 pages

Assignment ON Cryptography & Network Security

The document discusses different types of network attacks, including active and passive attacks. Active attacks modify or forge network packets and include masquerading, replaying, and denial of service attacks. Passive attacks involve unauthorized monitoring of communications without modification and include releasing message contents and traffic analysis. Masquerading involves assuming another entity's identity, while traffic analysis involves analyzing patterns in network traffic to draw conclusions about communications.

Uploaded by

Krisna Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

ASSIGNMENT ON CRYPTOGRAPHY & NETWORK SECURITY

SUBMITTED BY KRISHNA PRASAD SHARMA ME (CSE), 2nd SEMESTER ROLL NO:-G-12/ME-597

There are mainly two types of Network attacks:-

1. Active attacks 2. Passive attacks

Active attack:An active attack is one where the attacker modifies network packets while they are in transit, or sends forged network packets.

It can be subdivided into three categories: 1. Masquerade 2. Replay 3. Denial of service


1. Masquerade & Replay:

A masquerade takes place when one entity (may be the attacker) assumes the identity of another. A masquerade attack usually includes one of the other forms of active attack Masquerade and replay can be depicted with the help of following diagrams:-

Denial of service:-

A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target. This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.

Passive attack:A passive attack is an attack where an unauthorized attacker monitors or listens in on the communication between two parties. Two types of passive attacks are there:1. Release of message contents 2. Traffic analysis.

1. Release of message contents:-

Release of message content is easy to grasp just from its name and what it does it easily figured out also. In this type of passive attack a mail message, phone call any transferred message pretty much of sensitive information that would be intercepted or listened to.

3. Traffic analysis:-

Traffic Analysis is a little more complicated. It is very subtle and hard to detect it would be like this if we had a way to hide the information on a message and the hacker still viewed the information this would be a traffic analysis attack

You might also like