Shared Flashcard Set

Details

Attacks
N/A
15
Computer Science
Undergraduate 4
04/29/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What are the 3 modification attacks?
Definition
Packet misrouting
Impersonation attack
Sybil attack
Term
Describe a packet misrouting attack
Definition
Malicious nodes rereoute traffic from their original paht to make them reach the wrong destinations
Term
What is an impersonation attack?
Definition
Malicious node assumes the identity of another node in the network. That way they are able to received routing messages that are directed to the nodes they faked.
Term
What is a sybil attack?
Definition
A refined version of an impersonation attack but the attacker masquerades as multiple nodes
Term
What are the three iterception attacks?
Definition
Wormhole
Blackhole attacks
Routing packet analysis attack
Term
What is a wormhole attack?
Definition
Comrpomised node in the ad hoc network colludes with external attacker to create a shortcut in the networks
Term
What is a black hole attack?
Definition
A malicious node tricks all their neighbour nodes to attract all the routing packets to them. They do this by advertising that they are the most optimal route to the dest
Term
What is a routing packet analysis attack?
Definition
Exploits the promiscious mode of MANETs to eavesdrop
Term
What are the two fabrication attacks?
Definition
Sleep deprivation
Route salvaging attacks
Term
What is a sleep deprivation attack?
Definition
Drain off limited resources by constantly making them busy processing unnecessary packets
Term
What is a route salvaging attack?
Definition
Lanched by greedy internal nodes, there is no guarantee that each trasnmitted packet will successfully reach the desired destinnation. Misbehaving nodes will duplicate and retransmit packets even though they havn't received error messages (so they hog bandwidth)
Term
What are the three interruption attacks?
Definition
Packet dropping
Flooding
Lack of co-operation
Term
What is a packet dropping attack?
Definition
Adversary collaborates as usual in the route discovery process and lanunches the a constant packet dropping attack
Term
What is a flooding attack?
Definition
Adversaries interupt normal ops in the packet forwarding process by flooding the targetted destination nodes with huge unnecessary packets
Term
Lack of co-op
Definition
A misbehaving internal node not forwarding packets
Supporting users have an ad free experience!