ABSTRACT

Active attacks: In active attack, the attacker has access to the transmission channel and the transmission technique, so that he can change the data or transmit his own data in a “camouflaged” manner. Denial of Service (DoS), modification, replay, and insertion are the common active attacks.