Home Common Problem What is an active attack in network attack and defense?

What is an active attack in network attack and defense?

Jul 13, 2021 am 10:20 AM

Active attacks in network attack and defense are: 1. Tampering with messages, some parts of legitimate messages are changed or deleted, messages are delayed or changed in order; 2. Forgery of message data; 3. Denial of service, resulting in Normal use or management of communication equipment is unconditionally interrupted.

What is an active attack in network attack and defense?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Active attacks can lead to the tampering of certain data flows and the generation of false data flows. Such attacks can be divided into tampering, forgery of message data and termination (denial of service).

(1) Tampering with messages

Tampering with messages means that some parts of a legitimate message are changed or deleted, the message is delayed or the order is changed, usually to produce an unauthorized effect. If you modify the data in the transmission message, change "Allow A to perform operations" to "Allow B to perform operations."

(2) Forgery

Forgery refers to an entity (person or system) sending out data information containing the identity information of other entities, pretending to be other entities, and thereby obtaining some legal information through deception. Rights and Privileges of Users.

(3) Denial of Service

Denial of service, often referred to as DoS (Deny of Service), will cause the normal use or management of communication equipment to be unconditionally interrupted. It usually damages the entire network to reduce performance and terminal services. This attack may also have a specific goal, such as all packets to a specific destination (such as a security audit service) being blocked.

For more computer-related knowledge, please visit the FAQ column!

The above is the detailed content of What is an active attack in network attack and defense?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)