NS2 Issues in network simulation include acquisition of valid source information about the relevant selection of key characteristics and behaviors, and fidelity and validity of the simulation outcomes, the use of simplifying approximations and assumptions within the simulation. An attack is one of the issues of Ns2 issues. An attack is define as any attempt to disable, destroy, alter, expose, steal or gain unauthorized access to or make unauthorized use of an asset in computer network.
The modeling of real system is too complex. That is.
- Due to its complicated structure.
- Bugs are unreliable in real system.
- Does model reflect reality
- Large scale system: lot of resources is used to simulate.
- Real system may be slow due to its complex structure.
- Statistical uncertainty in results of modeling.
In general, the majority of network communications occur in an unsecured or “cleartext” format in a network. An attacker who has gain access to data paths in your network to “listen in” or interpret (read) the traffic is an Ns2 issues. The sniffing is referred as when an attacker is eavesdropping on your communications. The term sniffing is also call as snooping which is also one of the Ns2 issues.
After an attacker has read your data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to also modify in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to modify.
The password-based access control is the common denominator of most operating system and network security plans. Your access rights to a computer and network resources are determined by who you are, that is, your user name and your password is done by this control mechanism. It is passed through the network for validation and the older applications do not always protect identity information.
An attacker can do any of the following Ns2-issues when gaining access to your network with a valid account:
- Lists of valid user and also computer names and network information can be obtain.
- The server and also network configurations also modify which including access controls and routing tables.
- Modify, reroute, or delete your data is another important of Ns2 issues.
A secret code or number necessary to interpret secure information is define also as a key. Obtaining a key is a difficult and resource-intensive process for an attacker which is possible in Ns-2 issues. The key is refer to as a compromise key when an attacker obtains a key.
The attacker can do any of the following: and takes advantage of this situation, system, or network, gaining control of your application.
- An attacker can also able to add, delete, read, or modify your data or operating system which is an important Ns2 issues.
- A virus program can be introduce by an attacker. Throughout your network which also uses your computers and software applications to copy viruses.
- An effective process also for sniffer program is introduce to analyze your network and gain information that can also used to crash or to corrupt your systems and network eventually. Ns2-issues also include a sniffer program.
- Your data applications or operating systems can also terminate abnormally.
- To enable future attacks it disables other security controls is also another Ns2-issues.