Cyber Attacks: Active and Passive

By: Arya Brijith, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan,sia University, Taiwan, arya.brijithk@gmail.com

Abstract

In this article, we shall discuss about cyber-attacks. Mainly, the active and passive attacks.

Keywords Cyber-attacks, threat, active, passive.

Introduction

Cyber-attacks are a broad category of malicious actions intended to jeopardize data security and digital systems. It can be carried out for a variety of reasons, such as surveillance via data breaches or financial gain via ransomware. Cybercriminals’ techniques also change with technology; therefore, it is critical for people and organizations to constantly strengthen their defences and be alert to new threats to protect sensitive data and preserve the integrity of digital infrastructure. Cyber-attacks can be classified into two separate categories: passive and active attacks. Passive attacks deal with information gathering and active attack operations tries to disrupt a well-established organization by altering the data.[1]

Passive attacks

The goal of passive attack is to covertly obtain data without changing the original material. These assaults aim to get access and data without causing any long-term damage to the system. Passive attacks include things like listening in on unencrypted network communications and analysing traffic to identify patterns. They are comparable to digital surveillance as they anonymously collect information.

Active attacks

Active attacks, on the other hand, involve the deliberate alteration or disruption of data and systems and go beyond simple monitoring. These attacks seek to disrupt, damage, or obstruct regular system operations in addition to obtaining information. They aim to alter the receiving network’s configuration or functionality. Man-in-the-middle attacks, which intercept and maybe influence communications between two parties, and denial-of-service attacks, which render a network useless due to excessive traffic, are two examples.

Conclusion

The distinction between passive and active attacks draws attention to the complexity of cybersecurity threats, demanding a comprehensive defence strategy to deal with both implicit and explicit attempts to compromise digital integrity and data breaches. Also, it is necessary for users to beware of such attacks.

References

  1. Engli, F. W. (2020). Factors Determining Cyber Strategy: the Differences Between Active and Passive Cyber Attacks (Master’s thesis, University of Waterloo).
  2. Uma, M., & Padmavathi, G. (2013). A survey on various cyber attacks and their classification. Int. J. Netw. Secur.15(5), 390-396.
  3. 小出駿. (2021). A Study on Analyzing Cyber Attacks through Active and Passive Observation.
  4. Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal6(2), 1402-1409.
  5. Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2021). InFeMo: flexible big data management through a federated cloud system. ACM Transactions on Internet Technology (TOIT)22(2), 1-22.
  6. Gupta, B. B., Perez, G. M., Agrawal, D. P., & Gupta, D. (2020). Handbook of computer networks and cyber security. Springer10, 978-3.
  7. Bhushan, K., & Gupta, B. B. (2017). Security challenges in cloud computing: state-of-art. International Journal of Big Data Intelligence4(2), 81-107.

Cite As

Brijith A. (2023) Cyber Attacks: Active and Passive, Insights2Techinfo, pp.1

66110cookie-checkCyber Attacks: Active and Passive
Share this:

Leave a Reply

Your email address will not be published.