Replay Attack Last Updated : 23 Jun, 2020 Summarize Comments Improve Suggest changes Share Like Article Like Report Data has become very important to us in recent times. Safety and Security of data is of paramount importance. There are several confidential and sensitive information, which we cannot risk getting into wrong hands. However, sometimes an unauthorized person gets access to our information. Any action by an unauthorized person or hacker which poses a threat on the integrity, confidentiality and authentication of data is called a security attack. What is Replay Attack ? Replay Attack is a type of security attack to the data sent over a network. In this attack, the hacker or any person with unauthorized access, captures the traffic and sends communication to its original destination, acting as the original sender. The receiver feels that it is an authenticated message but it is actually the message sent by the attacker. The main feature of the Replay Attack is that the client would receive the message twice, hence the name, Replay Attack. Note - Arrows in the above image denote flow of communication. Prevention from Replay Attack : Timestamp method - Prevention from such attackers is possible, if timestamp is used along with the data. Supposedly, the timestamp on a data is more than a certain limit, it can be discarded, and sender can be asked to send the data again. Session key method - Another way of prevention, is by using session key. This key can be used only once (by sender and receiver) per transaction, and cannot be reused. Comment More infoAdvertise with us Next Article Crash Recovery in Transport Layer S supriya_saxena Follow Improve Article Tags : Computer Networks Information-Security Network-security Similar Reads Difference Between Go-Back-N and Selective Repeat Protocol Both the Go-Back-N Protocol and Selective Repeat Protocol are the types of sliding window protocols. The main difference between these two protocols is that after finding the suspect or damage in sent frames go-back-n protocol re-transmits all the frames whereas the selective repeat protocol re-tran 4 min read Difference Between Go-Back-N and Selective Repeat Protocol Both the Go-Back-N Protocol and Selective Repeat Protocol are the types of sliding window protocols. The main difference between these two protocols is that after finding the suspect or damage in sent frames go-back-n protocol re-transmits all the frames whereas the selective repeat protocol re-tran 4 min read Crash Recovery in Transport Layer A key concept in the transport layer of an organizational convention, which is responsible for ensuring the reliable transfer of information between two endpoints, is crash recovery. Information loss or tampering may result from an organization failure or crash that occurs during the transmission of 9 min read Sliding Window Protocol | Set 3 (Selective Repeat) Prerequisite : Sliding Window Protocol - Set 1 (Sender Side), Set 2 (Receiver Side) Why Selective Repeat Protocol? The go-back-n protocol works well if errors are less, but if the line is poor it wastes a lot of bandwidth on retransmitted frames. An alternative strategy, the selective repeat protoco 3 min read Fast Recovery Technique For Loss Recovery in TCP When the RTO timer expires but an ACK is not received, the sender confirms that the packet is lost due to congestion at intermediary devices. Now sender has to tackle this congestion state carefully. Fast Recovery is the packet loss recovery technique. Recovery means becoming inactive and not transm 4 min read Ruby redo and retry Statement In Ruby, Redo statement is used to repeat the current iteration of the loop. redo always used inside the loop. The redo statement restarts the loop without evaluating the condition again. Ruby # Ruby program of using redo statement #!/usr/bin/ruby restart = false # Using for loop for x in 2..20 if x 2 min read Like