The Gateway to Computer Science Excellence
First time here? Checkout the FAQ!
0 votes
Q1 one of the following is not the type of active attack

A. Denial of services

B  Masquerades

C. Fabrication

D.  Traffic analysis

if possible try to explain each option i tried to read it from wiki but didn't get more clarity
asked in Computer Networks by Loyal (8.4k points) | 58 views

2 Answers

0 votes
Traffic analysis is not an active attack.

Denial of services refers to making the data inaccessible or unavailable.

Masquerade uses fake identity either to gain information or pretends to be someone other and send information

Fabrication means inserting fabricated data along with authentic data.

However traffic analysis monitors networks and sometimes scans for open ports and vulnerabilities. The purpose is to gain information about the target and no data is changed.

Since no harm to data is caused, traffic analysis is a passive attack.
answered by (23 points)
no traffic analysis also a type of attack
It can find electronic address of sender and receiver
Here all 4 are type of attack
It is asked what is not an ACTIVE attack.
Any link can u give, that it is a passive attack?
0 votes

option(D) is correct.traffic analysis is not a active attack ,it is a passive attack

we know that passive attack is that which can use the information of other system but does not affect the resources .on the other hand active attack make use of other system's information and it affects or alter the system resources.

(A)-Denial of service-It prevents or inhibits the normal use or management of communications facilities. This attack may have a specific target;

Ex. An entity may suppress all messages directed to a particular destination. (e.g The security audit service) Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.

Figure 4.6 Denial of Service

(B) Masquerades-it takes place when one entity pretends to be different entity.

E.g. Authentication sequences can be captured and replayed after a valid authentication sequences has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by interpersonating an entity that has those privileges.

Figure 4.3 Masquerade

(C)fabrication- In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message.

(D) traffic analysis-it is a phenomenon in which when a sender sends some information to some receiver then in between them analyzing the pattern of message(information) from sender to receiver is called traffic analysis. It does not alter the system resources.

answered by Active (3.9k points)

Related questions

Quick search syntax
tags tag:apple
author user:martin
title title:apple
content content:apple
exclude -tag:apple
force match +apple
views views:100
score score:10
answers answers:2
is accepted isaccepted:true
is closed isclosed:true

47,139 questions
51,388 answers
66,701 users