Attacks can occur at various layers of the OSI (Open Systems Interconnection) model, targeting different aspects of network communication. Here’s a list of common types of attacks that can occur on each OSI layer:
- Physical Layer (Layer 1):
- Eavesdropping/Tapping: Unauthorized individuals physically intercept network traffic by tapping into cables or network equipment.
- Electromagnetic Interference (EMI): Deliberate interference with network signals through electromagnetic radiation, causing data corruption or loss.
- Data Link Layer (Layer 2):
- MAC Address Spoofing: Attackers forge or impersonate MAC addresses to gain unauthorized access to the network.
- ARP Spoofing/Poisoning: Attackers manipulate Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device, redirecting traffic to their own machine.
- Network Layer (Layer 3):
- IP Spoofing: Attackers forge or spoof IP addresses to impersonate trusted hosts, bypass access controls, or launch denial-of-service (DoS) attacks.
- ICMP Attacks: Attackers exploit weaknesses in the Internet Control Message Protocol (ICMP) to perform various attacks, such as ICMP flood attacks or ICMP redirect attacks.
- Transport Layer (Layer 4):
- SYN Flood: Attackers flood a target server with a large number of TCP SYN packets, overwhelming its resources and preventing legitimate connections.
- UDP Flood: Attackers flood a target server with a large number of UDP packets, consuming its bandwidth and causing denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks.
- Session Layer (Layer 5):
- Session Hijacking: Attackers take control of an existing session between two parties by stealing session identifiers or cookies, gaining unauthorized access to sensitive information or resources.
- Man-in-the-Middle (MitM) Attacks: Attackers intercept and modify communication between two parties without their knowledge, allowing them to eavesdrop on or manipulate the data exchanged.
- Presentation Layer (Layer 6):
- Code Injection: Attackers inject malicious code into data streams or files to exploit vulnerabilities in applications or systems that process the data.
- Format String Attacks: Attackers exploit vulnerabilities in software that handles format strings, leading to information disclosure or arbitrary code execution.
- Application Layer (Layer 7):
- SQL Injection: Attackers inject malicious SQL queries into web application inputs, exploiting vulnerabilities to access or manipulate databases.
- Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages viewed by other users, stealing session cookies or redirecting users to malicious sites.
- Distributed Denial-of-Service (DDoS): Attackers flood a target application or server with a large volume of traffic from multiple sources, rendering it unavailable to legitimate users.