You are on page 1of 6

ASSIGNMENT ON CRYPTOGRAPHY & NETWORK SECURITY

SUBMITTED BY KRISHNA PRASAD SHARMA ME (CSE), 2nd SEMESTER ROLL NO:-G-12/ME-597

There are mainly two types of Network attacks:-

1. Active attacks 2. Passive attacks

Active attack:An active attack is one where the attacker modifies network packets while they are in transit, or sends forged network packets.

It can be subdivided into three categories: 1. Masquerade 2. Replay 3. Denial of service


1. Masquerade & Replay:

A masquerade takes place when one entity (may be the attacker) assumes the identity of another. A masquerade attack usually includes one of the other forms of active attack Masquerade and replay can be depicted with the help of following diagrams:-

Denial of service:-

A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target. This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.

Passive attack:A passive attack is an attack where an unauthorized attacker monitors or listens in on the communication between two parties. Two types of passive attacks are there:1. Release of message contents 2. Traffic analysis.

1. Release of message contents:-

Release of message content is easy to grasp just from its name and what it does it easily figured out also. In this type of passive attack a mail message, phone call any transferred message pretty much of sensitive information that would be intercepted or listened to.

3. Traffic analysis:-

Traffic Analysis is a little more complicated. It is very subtle and hard to detect it would be like this if we had a way to hide the information on a message and the hacker still viewed the information this would be a traffic analysis attack