Professional Documents
Culture Documents
Here are some examples of attacks that can occur on each layer of the OSI model:
-Physical Layer: Attacks on the physical layer involve manipulating the physical
components of the network, such as cutting cables or disrupting power supplies. These
attacks can cause network downtime and prevent communication between devices.
-Data Link Layer: Attacks on the data link layer involve manipulating the data as it is
transmitted between devices. Examples include ARP spoofing, where an attacker sends
fake ARP messages to associate their MAC address with another device's IP address.
-Network Layer: Attacks on the network layer involve exploiting vulnerabilities in the
routing and addressing protocols used by the network. Examples include IP spoofing,
where an attacker sends packets with a fake source IP address to impersonate another
device, or denial-of-service (DoS) attacks, where an attacker floods a network with traffic
to overwhelm its resources and prevent legitimate traffic from getting through.
-Transport Layer: Attacks on the transport layer involve exploiting vulnerabilities in the
protocols used to establish and manage connections between devices. Examples
include SYN flood attacks, where an attacker sends a large number of connection
requests without completing the handshake process, or session hijacking, where an
attacker takes over an established session between two devices.