such as impersonation, modification, fabrication and replication.
Layer | Types of Attack |
Application | Malicious code, Data corruption, viruses and worms |
Transport | Session hijacking attack, SYN Flooding Attack |
Network | Black hole, Worm Hole, sinkhole, link spoofing, rushing aaaaaaaa aaaaaaaa aattack, replay attack, Sybil attack etc.spoofing, rushing attack, replay attack, Sybil attack etc. |
Data link | Selfish misbehaviour, malicious behaviour, traffic analysis. |
Words: 3336 - Pages: 14