Attacks | |||
External and Internal Attacks | |||
Active and passive attacks | |||
Stalling classification of routing attacks | Modification of attacks | ||
Interception attacks | |||
Fabrication attacks | |||
Interruption attacks | |||
Layer Wise Network attacks | Physical Layer attacks | Eaves Dropping | |
Jamming attacks | |||
Active interference Attacks | |||
Data/Mac Layer attacks | Selfish Nodes behavior | ||
Malicious nodes behavior | DoS Attacks | ||
Attacks on network integrity | |||
Attacking neighbor sensing protocols | |||
Traffic Analysis | |||
Network Layer Attacks | Black hole attacks | ||
Rushing Attacks | |||
Warm hole attacks | |||
Sinkhole Attacks | |||
Replay attacks | |||
Link withholding and spoofing attacks | |||
Resource consumption attacks | |||
Sybill Attacks | |||
Byzantine Attacks | |||
Transport Layer Attacks | Session Hijacking | ||
SYN Flooding Attacks | |||
Application Layer | Malicious code Attacks | ||
Repudiation Attacks |