Top Banner
Network Models Namesh Sanjitha
21

Network models and Attacks

Apr 15, 2017

Download

Engineering

Namesh Sanjitha
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network models and Attacks

Network ModelsNamesh Sanjitha

Page 2: Network models and Attacks

OverviewWhy do we need one…..?

Page 3: Network models and Attacks

OSI - Open Systems Interconnect

Page 4: Network models and Attacks

1. Physical Layer

Bit Stream

Electrical Pulses

1. Physical Layer

● Defines the physical aspects

■ Cables

■ NICs

Page 5: Network models and Attacks

2. Data Link LayerTwo sub layers:

1. MAC - Media Access Control Layer

i. Physical Addressing

ii. Accessing Shared Medium

2. LLC - Logical Link Control Layer

i. Error Control

ii. Data Framing

iii. Frame Sync

Page 6: Network models and Attacks

3. Network Layer● Logical Addressing

● Host to Host Communication

● Routing

Page 7: Network models and Attacks

4. Transport Layer● End to End Communication

● QoS

● Error Control

● Flow Control

Page 8: Network models and Attacks

5. Session Layer● Creating,

● Managing and

● Terminating

of Sessions

Page 9: Network models and Attacks

6. Presentation Layer● Data Formating

○ Provides independence from compatibility problems

● Data Encryption

Page 10: Network models and Attacks

7. Application LayerProvides Services required by applications

● File Transfer

● E-mail

● Web

Page 11: Network models and Attacks

TCP/IPNo need to study separately,

we have seen it all in OSI……...

Page 12: Network models and Attacks

Attacks Let’s go with OSI, since it is more

abstract

Page 13: Network models and Attacks

Physical Layer● Eavesdropping

● Replay Attack

● DoS :)

Page 14: Network models and Attacks

Data Link Layer

● MAC Address Spoofing

● ARP Poisoning

● MAC Flooding

Page 15: Network models and Attacks

Network Layer● Ip spoofing

● DoS

● Twin Access Point

● Ping of Death

● ICMP MITM

Page 16: Network models and Attacks

Transport Layer● Syn Flood

● Smurf

Page 17: Network models and Attacks

Session Layer● Session Hijacking

● Phishing

Page 18: Network models and Attacks

Presentation Layer● SSL stripping

● Malicious SSL Requests

Page 19: Network models and Attacks

Application Layer● DNS Spoofing

● Injection Attacks

● Browser Exploitation

● Brute Force Attacks

Page 20: Network models and Attacks

Q&A

Page 21: Network models and Attacks

Thank you!