Project Name: Network Vulnerability and Attacks by Layer
Description: – This article will help everyone to understand network Vulnerability and Attacks by Layer i.e. which Attack was exploited on which ISO / OSI layer. OSI model is a mapping model to acknowledge how computer networks functions and communicate. Using this ISO/OSI standard, enterprises can acknowledge where potentially network vulnerabilities exist within their network systems.
FAQ:-
- Network Attacks by ISO/OSI layer
- Network vulnerability by ISO/OSI layer
ISO/OSI Model provides a brief understanding of how the computer network operates and is categorized into different layers. In the cyber security world, threats can walk in at any point in time and any layer. In an unpredictable network, an enterprise must have a plan which addresses the threats and categorize them and enforce policies against them. Here is an honest effort to list down and categorize cyber-attacks and vulnerabilities by each layer in ISO/OSI Layer.
For detailed understanding of Protocol Usage by Each Layer follow link.
Vulnerabilities by Layer
The weakness of the system can be encountered in any of the network layers. For making the system strong against the attacks we should be educating ourselves enough about the vulnerabilities which can be impacted at each layer. Listed below are the few weaknesses which is observed on each layer.
Physical Layer:
Data/Hardware thefts, Unauthorized changes to the functional environment, Undetectable data interception, Wiretaps and reconnaissance, Open authentication, Rogue employees, and Access points
Data Link Layer: – Unauthorized joins and expansion of the network, VLAN join, Tagging and Hopping, Remote access of LAN, Topology and vulnerability discovery, Break-ins, Switch control, VLAN circumvention, spanning tree errors may be fortuitously or with intentionally introduced causing the data link layer to transmit packets in infinite loops.
Network Layer: – Guessing TCP sequence numbers, stealing existing session, No cryptography, No authentication, Works in broadcast, Unauthorized access, Route spoofing – circulate false network topology.
Transport Layer: – Three-way handshake flaws, TCP sequence number prediction, Port scan
Cyber Attack by Each Layer
To develop any kind of network model ISO/OSI guides us by categorizing it not protocol designing. This is very much similar to the blueprint one creates while building a house. Proper authorized trained staff is very essential for avoiding and minimizing the chances of threats. Educating and training as per the latest industry standards has become the need of the hour.
We have listed below all the important attacks which can happen by each ISO/OSI Layer.
Layer | Cyber Attacks by Layer |
Physical Layer | Stealing data Data Slurping Wiretapping Jamming, Tempering Bluejacking and Bluesnarfing Physical destruction Obstruction Manipulation of physical assets |
Data Link Layer | ARP poisoning MA flooding and spoofing Spanning-tree Multicast brute force Identity theft Attacks on VLAN trunking protocol & VLAN hopping Double-encapsulated 802.1Q/nested LAN attacks Cast collision attack Switch looping VLAN hopping STP malfunction DHCP starvation NDP spoofing |
Network Layer | Spoofing Teardrop Replay Wormhole Routing attack Network manipulation and consumption MITM DoS Cache poisoning ICMP flooding Smurf attack Wormhole attacks Sybil attack Sinkhole attack RIP security attack Packet Sniffing Back Hole/Selective Forwarding IP Smurfing Ping of Death SLAAC ( Stateless Address AutoConfiguration Attack) HSRP (Hot Standby Router Protocol) Hijacking RIPv2, EIGRP, OSPF table poisoning Command & Control attack |
Transport Layer | TCP hijacking TCP SY flooding UDP flooding TCP sequence prediction attack Smurf Attack, RIP attack Desynchronization attack Energy Drain attack |
Session Layer | Session hijacking DNS Poisoning Telnet / FTP sniffing Telnet Dos Attack MITM Cache poisoning DNS Redirect |
Presentation Layer | Unicode Vulnerabilities SSL Stripping SSL/TLS session sniffing SSL Hijacking Malformed SSL request |
Application Layer | Buffer Overflow Insecure http Randomized HTTP flood Cache bypass HTTP flood WordPress XML RPC flood Business logic flaws XSS CSRF (Cross Site Request Forgery) XFS (Cross Frame Scripting) Clickjacking Framejacking Open Redirect HTML, CSS inection XSHM (Cross Site History Manipulation) Denial-of-service attacks (DDoS) HTTP floods SQL injections Cross-site scripting Parameter tampering and Slow Loris attacks Web cache poisoning SSRF ( Server Side Request Forgery) CRLF injection Xpath injection LDAP injection DNS Amplification |
ISO/OSI model is complex but it details out all the functions, services, and protocol in depth.
This OSI/ISO model is very important in risk assessment for any organization to work smoothly.
Today, we could see even though multiple encryption methods are used in the industry hackers are finding more and more methods to damage a system.
A strong networking mechanism with the correct identification of vulnerabilities can save a system from threats.