Home > Common Problem > What is an active attack in network attack and defense?

What is an active attack in network attack and defense?

醉折花枝作酒筹
Release: 2023-01-13 00:39:06
Original
19026 people have browsed it

Active attacks in network attack and defense are: 1. Tampering with messages, some parts of legitimate messages are changed or deleted, messages are delayed or changed in order; 2. Forgery of message data; 3. Denial of service, resulting in Normal use or management of communication equipment is unconditionally interrupted.

What is an active attack in network attack and defense?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

Active attacks can lead to the tampering of certain data flows and the generation of false data flows. Such attacks can be divided into tampering, forgery of message data and termination (denial of service).

(1) Tampering with messages

Tampering with messages means that some parts of a legitimate message are changed or deleted, the message is delayed or the order is changed, usually to produce an unauthorized effect. If you modify the data in the transmission message, change "Allow A to perform operations" to "Allow B to perform operations."

(2) Forgery

Forgery refers to an entity (person or system) sending out data information containing the identity information of other entities, pretending to be other entities, and thereby obtaining some legal information through deception. Rights and Privileges of Users.

(3) Denial of Service

Denial of service, often referred to as DoS (Deny of Service), will cause the normal use or management of communication equipment to be unconditionally interrupted. It usually damages the entire network to reduce performance and terminal services. This attack may also have a specific goal, such as all packets to a specific destination (such as a security audit service) being blocked.

For more computer-related knowledge, please visit the FAQ column!

The above is the detailed content of What is an active attack in network attack and defense?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template