Data has become very important to us in recent times. Safety and Security of data is of paramount importance. There are several confidential and sensitive information, which we cannot risk getting into wrong hands. However, sometimes an unauthorized person gets access to our information. Any action by an unauthorized person or hacker which poses a threat on the integrity, confidentiality and authentication of data is called a security attack.
What is Replay Attack ?
Replay Attack is a type of security attack to the data sent over a network.
In this attack, the hacker or any person with unauthorized access, captures the traffic and sends communication to its original destination, acting as the original sender. The receiver feels that it is an authenticated message but it is actually the message sent by the attacker. The main feature of the Replay Attack is that the client would receive the message twice, hence the name, Replay Attack.
Arrows in the above image denote flow of communication.
Prevention from Replay Attack :
- Timestamp method –
Prevention from such attackers is possible, if timestamp is used along with the data. Supposedly, the timestamp on a data is more than a certain limit, it can be discarded, and sender can be asked to send the data again.
- Session key method –
Another way of prevention, is by using session key. This key can be used only once (by sender and receiver) per transaction, and cannot be reused.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between Active Attack and Passive Attack
- Denial of Service DDoS attack
- Birthday attack in Cryptography
- Sybil Attack
- Man In The Middle Attack | Avoid Falling Victim to MITM
- Difference between Threat and Attack
- Selective forwarding Attack in wireless Sensor Network
- Wormhole Attack in Wireless Sensor Networks
- What is Zed Attack Proxy?
- Brute Force Attack
- What is a Dictionary Attack?
- Sinkhole Attack in Wireless Sensor Networks
- US Maritime Attack
- Zero-day Exploit (Cyber Security Attack)
- Difference between DOS and DDOS attack
- CRLF Injection Attack
- XML External Entity (XXE) and Billion Laughs attack
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.