0 penilaian0% menganggap dokumen ini bermanfaat (0 suara)
39 tayangan2 halaman
Network layer attacks can disrupt routing protocols in several ways:
1. Routing discovery attacks target the route discovery phase by flooding networks with fake routing messages.
2. Routing maintenance attacks send false error messages to trigger unnecessary route repairs or invocations of costly maintenance procedures.
3. Data forwarding attacks involve nodes that participate in routing but then drop, modify, or delay forwarding data packets that they have been entrusted to transmit.
Network layer attacks can disrupt routing protocols in several ways:
1. Routing discovery attacks target the route discovery phase by flooding networks with fake routing messages.
2. Routing maintenance attacks send false error messages to trigger unnecessary route repairs or invocations of costly maintenance procedures.
3. Data forwarding attacks involve nodes that participate in routing but then drop, modify, or delay forwarding data packets that they have been entrusted to transmit.
Network layer attacks can disrupt routing protocols in several ways:
1. Routing discovery attacks target the route discovery phase by flooding networks with fake routing messages.
2. Routing maintenance attacks send false error messages to trigger unnecessary route repairs or invocations of costly maintenance procedures.
3. Data forwarding attacks involve nodes that participate in routing but then drop, modify, or delay forwarding data packets that they have been entrusted to transmit.
Network layer is attacked by variety of attacks. By attacking the network protocol, the attacker knows the traffic pattern, enter into the routing path between the source and destination and can control the network traffic flow.
1) Routing discovery attack: Routing attacks target the route discovery or maintenance phase by not following the rules of routing protocols. Routing message flooding attacks such as, hello flooding attacks, acknowledgement flooding attacks, routing table overflow and RREQ flooding are targeting the routing discovery phase.
2) Routing Maintenance attack: Route maintenance phase is attacked by sending false control messages, such as link broken error message. It causes route repairing or invocation of the costly maintenance of route. For example, AODV and DSR implement path maintenance procedures to recover broken paths. If the destination node or an intermediate node along an active path moves, the upstream node of the broken link broadcasts a route error message to all active upstream neighbors. The node also invalidates the route for this destination in its routing table. Attackers could take advantage of this mechanism to launch attacks by sending false route error messages.
3) Data forwarding attacks Some attacks target the data forwarding phase. A malicious node participates in the route discovery and maintenance phase but refuse to forward the packets. Instead of forwarding the packets it simply drop the packet, modifying the contents or flood data packets. They can also delay forwarding the time sensitive packets.
4) Other advanced attacks i) Black hole Attack In black hole attack, a malicious node uses its routing protocol in order to advertise itself for having the shortest path to the destination node or to the packet it wants to intercept. This hostile node advertises its availability of fresh routes irrespective of checking its routing table. In this way attacker node will always have the availability in replying to the route request and thus intercept the data packet and retain it. ii) Wormhole attack In this attack, attacker uses private tunnel to forward the data. The tunnel between to attackers is referred as wormhole. In this it records packets at one location and forward them using tunnel to another location. Network is disrupted by tunneling the control messages. If it is used in routing protocols such as DSR or AODV, it prevent route discovery other than through the wormhole.
iii) Byzantine attack A compromised node or a group of compromised nodes working together and carry out attacks to disrupt the routing services. The attacks may include create routing loops or selectively dropping packets.
iv) Rushing attack This attack is proposed by Hu et al. In route discovery, RREQ forwarded by attacker is first reach the neighbor of target. The routes obtained by this RREQ include the attacker. The attacker can quickly forward the RREQ than the legitimate user and this attacker is included in all the discovered routes.
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Palo Alto Networks: The Ultimate Guide To Quickly Pass All The Exams And Getting Certified. Real Practice Test With Detailed Screenshots, Answers And Explanations
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)