The document outlines various security attacks in mobile ad-hoc networks. It discusses the different types of routing protocols used in MANETs including proactive, reactive, and hybrid protocols. It then classifies security attacks into two categories: data traffic attacks and control traffic attacks. Specific attacks described include black hole, gray hole, jellyfish, worm hole, hello flood, bogus registration, man in middle, rushing, cache poisoning, and Sybil attacks. The document provides details on how each attack is carried out and its impact on the network.