Network models and Attacks

Post on 15-Apr-2017

61 Views

Category:

Engineering

1 Downloads

Preview:

Click to see full reader

Transcript

Network ModelsNamesh Sanjitha

OverviewWhy do we need one…..?

OSI - Open Systems Interconnect

1. Physical Layer

Bit Stream

Electrical Pulses

1. Physical Layer

● Defines the physical aspects

■ Cables

■ NICs

2. Data Link LayerTwo sub layers:

1. MAC - Media Access Control Layer

i. Physical Addressing

ii. Accessing Shared Medium

2. LLC - Logical Link Control Layer

i. Error Control

ii. Data Framing

iii. Frame Sync

3. Network Layer● Logical Addressing

● Host to Host Communication

● Routing

4. Transport Layer● End to End Communication

● QoS

● Error Control

● Flow Control

5. Session Layer● Creating,

● Managing and

● Terminating

of Sessions

6. Presentation Layer● Data Formating

○ Provides independence from compatibility problems

● Data Encryption

7. Application LayerProvides Services required by applications

● File Transfer

● E-mail

● Web

TCP/IPNo need to study separately,

we have seen it all in OSI……...

Attacks Let’s go with OSI, since it is more

abstract

Physical Layer● Eavesdropping

● Replay Attack

● DoS :)

Data Link Layer

● MAC Address Spoofing

● ARP Poisoning

● MAC Flooding

Network Layer● Ip spoofing

● DoS

● Twin Access Point

● Ping of Death

● ICMP MITM

Transport Layer● Syn Flood

● Smurf

Session Layer● Session Hijacking

● Phishing

Presentation Layer● SSL stripping

● Malicious SSL Requests

Application Layer● DNS Spoofing

● Injection Attacks

● Browser Exploitation

● Brute Force Attacks

Q&A

Thank you!

top related