YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Network models and Attacks

Network ModelsNamesh Sanjitha

Page 2: Network models and Attacks

OverviewWhy do we need one…..?

Page 3: Network models and Attacks

OSI - Open Systems Interconnect

Page 4: Network models and Attacks

1. Physical Layer

Bit Stream

Electrical Pulses

1. Physical Layer

● Defines the physical aspects

■ Cables

■ NICs

Page 5: Network models and Attacks

2. Data Link LayerTwo sub layers:

1. MAC - Media Access Control Layer

i. Physical Addressing

ii. Accessing Shared Medium

2. LLC - Logical Link Control Layer

i. Error Control

ii. Data Framing

iii. Frame Sync

Page 6: Network models and Attacks

3. Network Layer● Logical Addressing

● Host to Host Communication

● Routing

Page 7: Network models and Attacks

4. Transport Layer● End to End Communication

● QoS

● Error Control

● Flow Control

Page 8: Network models and Attacks

5. Session Layer● Creating,

● Managing and

● Terminating

of Sessions

Page 9: Network models and Attacks

6. Presentation Layer● Data Formating

○ Provides independence from compatibility problems

● Data Encryption

Page 10: Network models and Attacks

7. Application LayerProvides Services required by applications

● File Transfer

● E-mail

● Web

Page 11: Network models and Attacks

TCP/IPNo need to study separately,

we have seen it all in OSI……...

Page 12: Network models and Attacks

Attacks Let’s go with OSI, since it is more

abstract

Page 13: Network models and Attacks

Physical Layer● Eavesdropping

● Replay Attack

● DoS :)

Page 14: Network models and Attacks

Data Link Layer

● MAC Address Spoofing

● ARP Poisoning

● MAC Flooding

Page 15: Network models and Attacks

Network Layer● Ip spoofing

● DoS

● Twin Access Point

● Ping of Death

● ICMP MITM

Page 16: Network models and Attacks

Transport Layer● Syn Flood

● Smurf

Page 17: Network models and Attacks

Session Layer● Session Hijacking

● Phishing

Page 18: Network models and Attacks

Presentation Layer● SSL stripping

● Malicious SSL Requests

Page 19: Network models and Attacks

Application Layer● DNS Spoofing

● Injection Attacks

● Browser Exploitation

● Brute Force Attacks

Page 20: Network models and Attacks

Q&A

Page 21: Network models and Attacks

Thank you!


Related Documents