What is fabrication attack




















One method to perform this attack is through the relaying of topology discovery traffic, for which no comprehensive defense exists. This paper proposes to detect this attack using statistical analysis of link latencies. A novel solution has been designed requiring a new link to undergo a vetting period during which its latency is evaluated. This is subsequently compared against a baseline model for benign links. Interception Attacks : In an interception attack, an unauthorized individual gains access to confidential or private information.

Interception attacks are attacks against network confidentiality. Examples of Interception attacks :. Modification Attack It is an attempt to modify information that an attacker is not authorized to modify. This type of attack is an attack against the integrity of the information. Basically there is three types of modifications. Fabrication Attack : In a fabrication attack, an individual inserts counterfeit information, resources, or services into the network.

These attacks are attacks against the authentication, access control, and authorization capabilities of the network. Examples of Fabrication Attack:. Fabrication would, for example mean, you make up a non-existant supplier with made up contracts and regularily payments to your own account. Modification would mean in the same context you pick an existing supplier with existing valid contracts and existing, valid payments but change his account number to yours.

In fabrication , you put in a new counterfeit item into the data set. In modification , you just take an existing item from the data set and change it. As you already pointed out, the former compromises the authenticity of your data. Let's use an analogy Imagine you record your daily expenses. Someone gets a hold of it. Inserting a new bogus expense into your Aug record is data fabrication.

That day's record is no longer authentic. The latter on the other hand, compromises data integrity. Extending the previous analogy The record will still look authentic. But the total expense would be corrupted. Sign up to join this community. The best answers are voted up and rise to the top.

Stack Overflow for Teams — Collaborate and share knowledge with a private group. Create a free Team What is Teams?



0コメント

  • 1000 / 1000