You are on page 1of 6

Network Security

National Institute of Technology Silchar

Attacks
1. A Masquerade is a type of attack where the attacker pretends to be an authorized
user of a system in order to gain access to it or to gain greater privileges than they
are authorized for.
2. A spoofing attack is a situation in which one person or program successfully
masquerades as another by falsifying data and thereby gaining an illegitimate
advantage.
3. Packet sniffing (Snooping) is the act of capturing packets of data flowing across a
computer network. The software or device used to do this is called a packet sniffer.
Packet sniffing is to computer networks what wire tapping is to a telephone network.
Eavesdropping is secretly listening to the private conversation of others without
their consent
4. An exploit is a piece of software, a chunk of data, or a sequence of commands that
takes advantage of a bug or vulnerability in order to cause unintended or
unanticipated behavior to occur on computer software, hardware, or something
electronic.

Ripon Patgiri, Asst. Prof, CSE,


NIT Silchar

DDoS Attacks

Ripon Patgiri, Asst. Prof, CSE,


NIT Silchar

DDoS Attacks

Ripon Patgiri, Asst. Prof, CSE,


NIT Silchar

DDoS Attacks
1. A denial-of-service (DoS) or distributed denial-of-service (DDoS)
attack is an attempt to make a machine or network resource unavailable
to its intended users.
2. A DoS attack generally consists of efforts to temporarily or indefinitely
interrupt or suspend services of a host connected to the Internet.
3. Method of DoS:
Unusually slow network performance (opening files or accessing web
sites)
Unavailability of a particular web site
Inability to access any web site
Dramatic increase in the number of spam emails received- (E.g., email bomb)
Disconnection of a wireless or wired internet connection
Long term denial of access to the web or any internet services

Ripon Patgiri, Asst. Prof, CSE,


NIT Silchar

Attacks

Ripon Patgiri, Asst. Prof, CSE,


NIT Silchar

You might also like