A Piggyback attack is an active form of wiretapping where the attacker gains access to a system via intervals of inactivity in another user's legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1]
In security, piggybacking refers to when someone tags along with another person who is authorized to gain entry into a restricted area. The term is applied to computer networks in this context.[2]
References
edit- ^ David Kim; Michael G. Solomon (2010). Fundamentals of Information Systems Security. Jones & Bartlett Publishers. ISBN 978-1449671648.
- ^ IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.