Common Network Attacks
Common Network Attacks
Passive attacker does not disturb or distort the operation of a routing protocol
but tries to discover the important information from routed traffic that can be
used for future harmful attacks.
Attacks may target the link layer by disrupting the cooperation of the
layer’s protocols.
3. Network Layer Attack
• Network layer protocols extend connectivity from neighbouring 1-hops nodes
to all other nodes in the network. The connectivity between mobile hosts over
a potentially multi-hop wireless link strongly relies on cooperative reactions
among all network nodes.
The attackers can create routing loops, introduce severe network congestion,
and channel contention into certain areas. Multiple colluding attackers may
even prevent a source node from finding any route to the destination, causing
the network to partition, which triggers excessive network control traffic, and
further intensifies network congestion and performance degradation.
4.Transport Layer Attack
• The objectives of TCP-like Transport layer protocols
include setting up of end-to-end connection, end-to-end
reliable delivery of packets, flow control, congestion
control, clearing of end-to-end connection.
• 6.Multi-layer Attack
• Some security attacks can be launched from multiple
layers instead of a particular layer. Examples of multi-
layer attacks are Denial of Service (DoS), man-in-the-
middle and impersonation attacks.