Upload
namesh-sanjitha
View
62
Download
1
Embed Size (px)
Citation preview
Network ModelsNamesh Sanjitha
OverviewWhy do we need one…..?
OSI - Open Systems Interconnect
1. Physical Layer
Bit Stream
Electrical Pulses
1. Physical Layer
● Defines the physical aspects
■ Cables
■ NICs
■
2. Data Link LayerTwo sub layers:
1. MAC - Media Access Control Layer
i. Physical Addressing
ii. Accessing Shared Medium
2. LLC - Logical Link Control Layer
i. Error Control
ii. Data Framing
iii. Frame Sync
3. Network Layer● Logical Addressing
● Host to Host Communication
● Routing
4. Transport Layer● End to End Communication
● QoS
● Error Control
● Flow Control
5. Session Layer● Creating,
● Managing and
● Terminating
of Sessions
6. Presentation Layer● Data Formating
○ Provides independence from compatibility problems
● Data Encryption
7. Application LayerProvides Services required by applications
● File Transfer
● Web
TCP/IPNo need to study separately,
we have seen it all in OSI……...
Attacks Let’s go with OSI, since it is more
abstract
Physical Layer● Eavesdropping
● Replay Attack
● DoS :)
Data Link Layer
● MAC Address Spoofing
● ARP Poisoning
● MAC Flooding
Network Layer● Ip spoofing
● DoS
● Twin Access Point
● Ping of Death
● ICMP MITM
Transport Layer● Syn Flood
● Smurf
Session Layer● Session Hijacking
● Phishing
Presentation Layer● SSL stripping
● Malicious SSL Requests
Application Layer● DNS Spoofing
● Injection Attacks
● Browser Exploitation
● Brute Force Attacks
Q&A
Thank you!