OSI Security
OSI Security
OSI Security
3
An attempt for a framework for developing
networking technologies
OSI became a tool for explaining the
Networking in general
Before OSI was created people created their
Software/Hardware as they wanted it to be.
There was not any compatibility. Now OSI is
used as a rule set for all vendors to create their
Software/Hardware by using the standards.
Protocol Reference Model of OSI
II OSI Overview
Points 2 remember
Parallel SCSI buses operate in this layer
PS: Logical SCSI protocol is transport layer protocol & runs over this bus
DATA UNIT: BIT
VULNERABILITIES
• Van Eck Phreaking -- remote eavesdropping on the
signals in CRT or VDT
• Electromagnetic Shielding
• physical addressing; Bridges, Layer 2 Switches
• network topology
• line discipline (how end systems will use the network link)
• error notification
• Switches
– VLAN trunking protocol vulnerabilities
– negotiate access to multiple VLANs
-- VLAN traffic flooding
Points 2 remember
Wardriving is layer 1 & 2 vulnerability
CONTROLS
• MAC Address Filtering- Identifying stations by
address and cross-referencing physical port or
logical access
Points 2 remember
Might perform fragmentation and reassembly, and report
delivery errors.
DATA UNIT: PACKET
VULNERABILITIES
• Route spoofing - propagation of false network topology
• IP Address Spoofing- false source addressing on malicious packets
• Identity & Resource ID Vulnerability - Reliance on addressing to identify resour
CONTROLS
• Dialogs can be
– simplex (one-way)
– half-duplex (alternate)
– full-duplex (bi-directional)
Points 2 remember
Implemented explicitly in application environments that use
remote procedure calls.
DATA UNIT: SPDU
VULNERABILITIES
• Weak or non-existent authentication mechanisms
Points 2 remember
Format String Vulnerability & Buffer Overflow
DATA UNIT: PPDU
CONTROLS
• Careful specification and checking of received input
incoming into applications or library functions
OSI Summary
Protocol Reference Model of OSI
I History
1. The need for standardisation
- many vendors, no interoperability
- no common framework
OSI Overview
4. Data Encapsulation
a) PDU conception – each
protocol on the diff. layer
has its own format.
b) Headers are added while
a packet is going down the
stack at each layer.
c) Trailers are usually added
on the second layer.
Pretty similar to OSI
TCP/IP has less layers(four)
Main difference in layers is after layer 4
Applications and Services run on it
Enables human network to interface the underlying data network
Applications on that layer (E-mail clients, web browsers, Chats,
etc.) – top-stack applications (As people are on the top of the
stack)
Applications provide people with a way to create message
Application layer services establish an interface to the network
Protocols provide the rules and formats that govern how data is
treated
Protocols on the destination and the host must match
Protocol Reference Model of OSI
◦ Session establishment,
maintenance and termination
(Deciding who sends, and
when.)
◦ Session support (security,
name recognition, logging )
Tracking the individual communication between applications on the
source and destination hosts
Segmenting data and managing each piece
Reassembling the segments into streams of application data
Identifying the different applications
Conversation Multiplexing
Segments
Connection-oriented conversations
Reliable delivery
Ordered data reconstruction
Flow control
TCP – Web Browser
UDP – Video Streaming Applications
Protocol Reference Model of OSI
◦ Logical Addressing
◦ Routing (where the packet is
destinated to)
◦ Datagram Encapsulation
◦ Fragmentation and Reassembly
(handling too big packets )
◦ Error Handling and Diagnostics (
using status messages for example
)
Protocol Reference Model of OSI
End to end packet delivery
It is the role of the OSI Data Link layer to prepare Network layer packets for
transmission and to control access to the physical media.
Allows the upper layers to access the media using techniques such as framing
Controls how data is placed onto the media and is received from the media
using techniques such as media access control and error detection
Frame - The Data Link layer PDU
Node - The Layer 2 notation for network devices connected to a common
medium
Media/medium - The physical means for the transfer of information between
two nodes
Network - Two or more nodes connected to a common medium
The Data Link layer is responsible for the exchange of frames between nodes
over the media of a physical network.
Protocol Reference Model of OSI