0% found this document useful (0 votes)
2 views

Network Security Issues in Regard To Osi Reference Model Layers

materi

Uploaded by

siagianradja41
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Network Security Issues in Regard To Osi Reference Model Layers

materi

Uploaded by

siagianradja41
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

th

6 International Scientific and Expert Conference TEAM 2014


Technique, Education, Agriculture & Management
Kecskemét, November 10-11, 2014

NETWORK SECURITY ISSUES IN REGARD TO OSI


REFERENCE MODEL LAYERS
Marko Martinović*, Dino Lovaković and Tomislav Ćosić
College of Slavonski Brod, Dr. Mile Budaka 1, 35000 Slavonski Brod, Croatia
* Corresponding author e-mail: [email protected]

Abstract Example is ISO's theoretical OSI layered model,


Today, almost all aspects of what we regard as while in practice, we encounter US DoD's IP
data-in-storage and data-on-move is connected. practical model.
Entire organizational infrastructure is networked OSI communications model consists of seven
and capable of inter-communication. Such layers which are Application, Presentation,
capabilities offer easy reach and focus on data, Session, Transport, Network, Data link and
which is considered a primary value to any Physical. Each layer houses its own protocols
organization or institution that possesses it. which cooperate in sending and receiving user and
However, with the need for high data and application data and passing it up and down the
communications availability also comes a potential stack.
risk. Various threats can compromise and breach Their equivalents in IP model are Application layer,
data integrity and confidentiality by finding a way Transport Layer, Internet Layer and Network
into or “taping” regular network channels. Interface layer, respectively.
Computer networks based on TCP/IP stack use
various layers of communication and underlying
protocols respectively.
Such design can provide independent fault
tolerance and ensures compatibility of equipment
made from different vendors as they all adhere to
open standards.
Here, we will address the issues of most common
security threats on Layers 2, 3 and 4 of the OSI
model, and their DoD model counterparts, as they
are, by far, the most targeted by todays potential
threats.
Mitigation techniques and security policies will also
be mentioned as they are vital part of both data
confidentiality and integrity.

Keywords:
Network, security, OSI Model, IP protocol, security
Figure 1. OSI and IP models[1]
issues
In data protection and security, steps have to be
1. Introduction
taken to ensure secure means of data
Any network today relies on networking devices
transportation between two or more endpoints.
such as routers and switches. These devices form
a network itself and enable creation of
2. Methods of protection
communication channels between devices and end
IP model's Application layer incorporates functions
users.
of Application, Presentation and Session layers in
In their process of inter-communication, these
OSI model. Therefore, its purpose is to handle
devices use protocols which have the role of
users input and application raw data values, which
language necessary for understanding. Most of the
is the first step of communication.
common protocols used are developed in an open
Protocols domesticated on this layer are HTTP and
manner and adhere to certain standards, which, in
HTTPS, POP, SMTP and IMAP, IRC, FTP and
return, enable devices to communicate regardless
SFTP. Of course, number is quite large and,
of vendor or country of origin.
therefore, not all are listed [2].
Through the development of layered model, with
Data protection of Application layer relies primarily
each layer being interdependent of adherent
on inspection of data in transit using Application
layers, standards establishing the communication
layer firewalls. Such devices filter traffic primarily
framework emerged.

Marko Martinović, Dino Lovaković and Tomislav Ćosić 105


th
6 International Scientific and Expert Conference TEAM 2014
Technique, Education, Agriculture & Management
Kecskemét, November 10-11, 2014

by application data type and those types of devices


are considered application-aware.
Ability of determining source and destination of
data, application that uses it and preprogramed
rules of communications, such types of devices
can quickly disseminate arbitrary traffic and the
potential malicious payload that lies underneath Figure 3. Transport layer header of the UDP
such as viruses, worms or simply a non- datagram along with data[5]
compliance to defined criteria.
The ability to consider and inspect traffic as a Network layer of the OSI model, also known as IP
whole, throughout separate communications models Internet layer is the layer where Internet
channels, is what gives Application layer firewalls traffic routing takes place. On this layer, TCP and
an edge over devices that filter traffic on underlying UDP segments that are passed down get IP
layers of the OSI model, but also carries a need for header attached and thus become referred to as
greater quantity of computational resources. packets. On the Internet layer, IP addresses play a
major role in packet routing and relay.
Filtering packets is primarily done in that regard as
well, by usage of source and destination IP
addresses in each packets header (such as
packet-per-packet filtering).
Network layer filtering gives the ability of allowing,
dropping or denying traffic originating from one or
more addresses and termed for single or multiple
destinations.
Since the Network layer handles packet delivery
across Internet and other IPv4 based networks,
such mechanism allows the discardment of
packets before sending them to higher layer (e.
Transport) and thereby reducing the overhead of
upper layer process and filtering.
IPs Network access layer incorporates first two
Figure 2. Application layer protocols [3] layers of the OSI model; Physical and Data link,
respectively. Main characteristic of this layer is that
On the Transport layer of the IP and OSI models, it is comprised of both physical and logical aspects
most common protocols are TCP and UDP. These of networking. Such setup allows for unified
protocols are in charge of separation of data standards, and indirectly, better protection of local
depending of the source and destination ports and networking space.
application using it. Just like IP addresses are used in determining
On this layer, initial segmentation of data is done source and destination on Internet layer of IP
and each segment or datagram, whether TCP or model, in Network access layer, a concept of MAC
UDP, has an Transport layer header attached to it addresses is used.
before its passed down the stack to a layer As packets are passed down to this layer, a
beneath. header and a trailer are attached and thus a
Regardless of differences between TCP and UDP, packet becomes referred to as frame.
and underlying mechanics, Transport layer header Most often, communication is done via frame
always contains source and destination port switching as each client's network interface card
number. has a unique MAC (Media Access Control)
Devices that filter traffic on Transport layer depend address which represents them in a network.
mostly on this given data to successfully deny, Physical control of the network is accomplished
reject or allow traffic flow to a certain application or through challenge and filtering of allowed devices
service port number. upon connection initiation.
All popular services have well known or introduced A type of firewall control can also be included in
port numbers and by inspecting and matching the communication process which enables the setting
packet construction and payload, Transport layer of allow or deny decisions based on source and
firewalls can quickly differentiate between destination MAC addresses.
legitimate or allowed and illegitimate or arbitrary Pseudo-physical separation can also be
traffic and make a decision based on those implemented via the usage of VLAN technology,
criteria[4]. which allows grouping and isolation of chosen
hosts on the network, based on various criteria
such as location or purpose[3].

106 Network Security Issues in Regard to OSI Reference Model Layers


th
6 International Scientific and Expert Conference TEAM 2014
Technique, Education, Agriculture & Management
Kecskemét, November 10-11, 2014

Along with security benefits, this type of


administration allows the avoidance of congestion
by permitting only traffic that passed the entire
security infrastructure and also cuts down on
resource overhead by stopping various threats as
low as possible, without sending it up the stack.

4. Conclusion
While security issues represent a significant threat
to today’s enterprise environments, both from
internal and external subjects, well placed
preemptive security measures can minimize or
almost completely mitigate large portions of risk
involved with the ability to keep data access
allowed purposely for legitimate use.

References
[1] networklessons.com (retrieved 21.07.2014)
[2] Cole E., Krutz R and Conley J, “Network
Figure 4. Topology of VLAN technologies [7] security bible”, Wiley publishing, ISBN 0-
7645-7397-7
3. Viewing the results [3] highteck.net (Retrieved 26.07.2014)
By using suggested methods of protection on [4] Gibson D, “Security+ Guide”, Gibson, ISBN 1-
various layers of the OSI or IP models, a certain 4637-6236-4
level of granularity is achieved in network security [5] tcp-udp.de (Retrieved 28.07.2014)
matter that goes from more general security [6] Barker K., Morris S., “CCNA Security Guide”,
measures to more specific ones. Ciscopress, ISBN 1-5872-0446-0
All this is achieved for the purpose of enhancing [7] cisco.com (Retrieved 09.08.2014)
the security through combination of multiple layers
of security, usually known as “Defense-in-Depth”
which states that: “even if one measure fails,
another one will take its place”.

Marko Martinović, Dino Lovaković and Tomislav Ćosić 107

You might also like