Understanding Active vs. Passive Attacks in Network Security π
Learn the differences between active and passive attacks, their impact on network security, and how cryptography helps protect against them. Essential insights for safeguarding your digital infrastructure.

Bikki Mahato
84 views β’ Feb 26, 2023

About this video
Types of attack | Active | Passive | Network Security | Cryptography and Network Security
Types of attack
Passive Attacks
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.
The release of message contents is easily understood. A telephone conversation, an electronic mail message, and a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.
A second type of passive attack, traffic analysis, is subtler. If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place
Active Attacks
Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service. A masquerade takes place when one entity pretends to be a different entity.
A masquerade attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges.
Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
Modification of messages simply means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect. For example, a message meaning βAllow John Smith to read confidential file accountsβ is modified to mean βAllow Fred Brown to read confidential file accounts.β
The denial of service prevents or inhibits the normal use or management of communications facilities. This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.
Please Like, Comment and Share the Video among your friends.
Also, Subscribe if you haven't already! :)
#BikkiMahato
The best part is: it is all completely free!
------------------------------------------------------------------------------
Follow :)
YouTube : https://www.youtube.com/c/BikkiMahato
Facebook : https://www.facebook.com/mahatobikki
Facebook Page : https://www.facebook.com/youtubebikki
Twitter : https://twitter.com/mahato_bikki
Instagram : https://www.instagram.com/bikkimahato
Google+ : https://plus.google.com/u/0/+BikkiMahato
Blogger : https://bikkimahato.blogspot.in
Pinterest: https://in.pinterest.com/bikkimahato123/
LinkedIn : https://www.linkedin.com/in/bikkimahato
------------------------------------------------------------------------------
DONATE Support :)
Patreon : https://www.patreon.com/bikkimahato
Instamojo : https://www.instamojo.com/@bikkimahato
Paypal : https://www.paypal.me/bikkimahato
Types of attack
Passive Attacks
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.
The release of message contents is easily understood. A telephone conversation, an electronic mail message, and a transferred file may contain sensitive or confidential information. We would like to prevent an opponent from learning the contents of these transmissions.
A second type of passive attack, traffic analysis, is subtler. If we had encryption protection in place, an opponent might still be able to observe the pattern of these messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place
Active Attacks
Active attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service. A masquerade takes place when one entity pretends to be a different entity.
A masquerade attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges.
Replay involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
Modification of messages simply means that some portion of a legitimate message is altered, or that messages are delayed or reordered, to produce an unauthorized effect. For example, a message meaning βAllow John Smith to read confidential file accountsβ is modified to mean βAllow Fred Brown to read confidential file accounts.β
The denial of service prevents or inhibits the normal use or management of communications facilities. This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network, either by disabling the network or by overloading it with messages so as to degrade performance.
Please Like, Comment and Share the Video among your friends.
Also, Subscribe if you haven't already! :)
#BikkiMahato
The best part is: it is all completely free!
------------------------------------------------------------------------------
Follow :)
YouTube : https://www.youtube.com/c/BikkiMahato
Facebook : https://www.facebook.com/mahatobikki
Facebook Page : https://www.facebook.com/youtubebikki
Twitter : https://twitter.com/mahato_bikki
Instagram : https://www.instagram.com/bikkimahato
Google+ : https://plus.google.com/u/0/+BikkiMahato
Blogger : https://bikkimahato.blogspot.in
Pinterest: https://in.pinterest.com/bikkimahato123/
LinkedIn : https://www.linkedin.com/in/bikkimahato
------------------------------------------------------------------------------
DONATE Support :)
Patreon : https://www.patreon.com/bikkimahato
Instamojo : https://www.instamojo.com/@bikkimahato
Paypal : https://www.paypal.me/bikkimahato
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
84
Likes
1
Duration
7:05
Published
Feb 26, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now