Packet drop attack
In
The malicious router can also accomplish this attack selectively, e.g. by dropping packets for a particular network destination, at a certain time of the day, a packet every n packets or every t seconds, or a randomly selected portion of the packets. If the malicious router attempts to drop all packets that come in, the attack can actually be discovered fairly quickly through common networking tools such as traceroute. Also, when other routers notice that the compromised router is dropping all traffic, they will generally begin to remove that router from their forwarding tables and eventually no traffic will flow to the attack. However, if the malicious router begins dropping packets on a specific time period or over every n packets, it is often harder to detect because some traffic still flows across the network.[1]
The packet drop attack can be frequently deployed to attack
See also
References
- ^ a b Zhang, Xiaobing; et al. (2000). "Malicious packet dropping: how it might impact the TCP performance and how we can detect it" (PDF). Icmp: 263.
- ^ Al-Shurman, Mohammad; et al. "Black Hole Attack in Mobile Ad Hoc Networks" (PDF). Archived from the original (PDF) on 2013-12-28. Retrieved 2013-04-07.
- ^ Wang, Weichao. "Defending against Collaborative Packet Drop Attacks on MANETs" (PDF). Retrieved 2011-05-05.