i. Attacks on secrecy and authentication
ii. Silent attacks on service integrity
iii. Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category. This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]: