0% found this document useful (0 votes)
12 views

Internal Attacks Are Directly Leads To The Attacks On Nodes Presents in Network

Internal attacks arise from compromised or malicious nodes within a network that broadcast incorrect routing information, making them difficult to identify compared to external attacks. Internal attackers can generate valid signatures using private keys. External attacks are launched by unauthorized adversaries and aim to cause problems like network congestion or denial of service through methods such as bogus packet injection or impersonation. External attacks are classified as either active or passive.

Uploaded by

Arockiaruby Ruby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Internal Attacks Are Directly Leads To The Attacks On Nodes Presents in Network

Internal attacks arise from compromised or malicious nodes within a network that broadcast incorrect routing information, making them difficult to identify compared to external attacks. Internal attackers can generate valid signatures using private keys. External attacks are launched by unauthorized adversaries and aim to cause problems like network congestion or denial of service through methods such as bogus packet injection or impersonation. External attacks are classified as either active or passive.

Uploaded by

Arockiaruby Ruby
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

2.

1 Internal attacks
Internal attacks are directly leads to the attacks on nodes presents in network
and links interface between them. This type of attacks may broadcast wrong type of
routing information to other nodes [10]. Internal attacks are sometimes more difficult to
handle as compare to external attacks, because internal attacks arise from more trusted
nodes. The wrong routing information generated by compromised nodes or malicious
nodes are difficult to identify. This difficulty occurs due to the compromised nodes,
which are able to generate the valid signature using their private keys.

2.2 External attacks
External attacks are attacks launched by adversaries who are not initially
authorized to participate in the network operations. These attacks usually aim to cause
network congestion, denying access to specific network function or to disrupt the whole
network operations. Bogus packets injection, denial of service, and impersonation are
some of the attacks that are usually initiated by the external attackers. External attacks
are classified into two categories: Active and passive attacks.

You might also like