Download - Network models and Attacks
![Page 1: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/1.jpg)
Network ModelsNamesh Sanjitha
![Page 2: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/2.jpg)
OverviewWhy do we need one…..?
![Page 3: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/3.jpg)
OSI - Open Systems Interconnect
![Page 4: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/4.jpg)
1. Physical Layer
Bit Stream
Electrical Pulses
1. Physical Layer
● Defines the physical aspects
■ Cables
■ NICs
■
![Page 5: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/5.jpg)
2. Data Link LayerTwo sub layers:
1. MAC - Media Access Control Layer
i. Physical Addressing
ii. Accessing Shared Medium
2. LLC - Logical Link Control Layer
i. Error Control
ii. Data Framing
iii. Frame Sync
![Page 6: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/6.jpg)
3. Network Layer● Logical Addressing
● Host to Host Communication
● Routing
![Page 7: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/7.jpg)
4. Transport Layer● End to End Communication
● QoS
● Error Control
● Flow Control
![Page 8: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/8.jpg)
5. Session Layer● Creating,
● Managing and
● Terminating
of Sessions
![Page 9: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/9.jpg)
6. Presentation Layer● Data Formating
○ Provides independence from compatibility problems
● Data Encryption
![Page 10: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/10.jpg)
7. Application LayerProvides Services required by applications
● File Transfer
● Web
![Page 11: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/11.jpg)
TCP/IPNo need to study separately,
we have seen it all in OSI……...
![Page 12: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/12.jpg)
Attacks Let’s go with OSI, since it is more
abstract
![Page 13: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/13.jpg)
Physical Layer● Eavesdropping
● Replay Attack
● DoS :)
![Page 14: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/14.jpg)
Data Link Layer
● MAC Address Spoofing
● ARP Poisoning
● MAC Flooding
![Page 15: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/15.jpg)
Network Layer● Ip spoofing
● DoS
● Twin Access Point
● Ping of Death
● ICMP MITM
![Page 16: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/16.jpg)
Transport Layer● Syn Flood
● Smurf
![Page 17: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/17.jpg)
Session Layer● Session Hijacking
● Phishing
![Page 18: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/18.jpg)
Presentation Layer● SSL stripping
● Malicious SSL Requests
![Page 19: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/19.jpg)
Application Layer● DNS Spoofing
● Injection Attacks
● Browser Exploitation
● Brute Force Attacks
![Page 20: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/20.jpg)
Q&A
![Page 21: Network models and Attacks](https://reader033.vdocuments.us/reader033/viewer/2022051300/587d53911a28abee158b5165/html5/thumbnails/21.jpg)
Thank you!