Network attack in which valid data transmission is repeated or delayed
A replay attack (also known as a repeat attack or playback attack) is a form of network[1] attack in which valid data transmission is maliciously or fraudulently repeated or delayed.[1] This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution. This is one of the lower-tier versions of a man-in-the-middle attack. Replay attacks are usually passive in nature.
Another way of describing such an attack is:
"an attack on a security protocol using a replay of messages from a different context into the intended (or original and expected) context, thereby fooling the honest participant(s) into thinking they have successfully completed the protocol run."[2]
^ abEl Abbadi, Reda; Jamouli, Hicham (2021-01-25). Moreno-Valenzuela, Javier (ed.). "Takagi–Sugeno Fuzzy Control for a Nonlinear Networked System Exposed to a Replay Attack". Mathematical Problems in Engineering. 2021: 1–13. doi:10.1155/2021/6618105. ISSN 1563-5147.
^Malladi, Sreekanth. "On Preventing Replay Attacks on Security Protocols" (PDF). oai.dtic.mil. Archived (PDF) from the original on January 20, 2022.
A replayattack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently...
the attacker needs many, possibly tens of thousands, of measurements to learn secrets. However, the MicroScope attack allows a malicious OS to replay code...
Look up replay in Wiktionary, the free dictionary. Replay may refer to: Replay (sports), a replayed match between two sport teams Game replay, a recording...
the events it received. This provides protection against capture and replayattack, known as RollJam for Samy Kamkar's work. For simplicity, individual...
request should be authenticated to avoid a spoofing attack and its timestamp verified to avoid a replayattack. Different techniques to authenticate the client...
July 2016, due to reliance on the same clients, the DAO fork created a replayattack where a transaction was broadcast on both the ETC and ETH networks....
entry systems to prevent a simple form of replayattack, where an eavesdropper records the transmission and replays it at a later time to cause the receiver...
authentication protocol to ensure that old communications cannot be reused in replayattacks. They can also be useful as initialization vectors and in cryptographic...
relay attack (also known as the two-thief attack) in computer security is a type of hacking technique related to man-in-the-middle and replayattacks. In...
KRACK ("Key Reinstallation Attack") is a replayattack (a type of exploitable flaw) on the Wi-Fi Protected Access protocol that secures Wi-Fi connections...
or protocol to be different between the two directions. Replayattack Man-in-the-middle attack Pass the hash Computer Networks by Andrew S. Tanenbaum,...
Session replay is the ability to replay a visitor's journey on a web site or within a mobile application or web application. Replay can include the user's...
OCSP can be vulnerable to replayattacks, where a signed, 'good' response is captured by a malicious intermediary and replayed to the client at a later...
vulnerable to a replayattack, by sending the same request and signature a second time. Vũ, Hoàng (2012-03-30). "MD5 Length Extension Attack Revisited - Vũ's...
integrity, data confidentiality (encryption), and replay protection (protection from replayattacks). Starting in the early 1970s, the Advanced Research...
verification can be used to defend against replay-based attacks. A current technique that detects end-to-end replayattacks is the use of deep convolutional neural...
album by Casiopea Freshness (cryptography), certainty that replayed messages in a replayattack on a protocol will be detected as such Fresh (disambiguation)...
are, the session will end. Replayattack A replayattack is similar to a MITM attack in which older messages are replayed out of context to fool the server...
practices. The voting system was also found to be vulnerable to a limited replayattack. Note that DigiVote is a trade name owned by German-based company Brähler...
Meaconing, the interception and rebroadcast of navigation signals Replayattack, a network attack in which transmitted data is fraudulently repeated or delayed...