Network stack (dode) - attack patterns on each layer & how to defend it
From Computing and Software Wiki
(Difference between revisions)
| Line 1: | Line 1: | ||
We are talking about the dode model here: | We are talking about the dode model here: | ||
| + | |||
| + | Dode: | ||
| + | |||
| + | - Application/Presentation | ||
| + | |||
| + | - Session | ||
| + | |||
| + | - Transport: transports | ||
| + | |||
| + | - Network | ||
| + | |||
| + | - Data link | ||
| + | |||
| + | - Physical | ||
Revision as of 18:15, 22 March 2008
We are talking about the dode model here:
Dode:
- Application/Presentation
- Session
- Transport: transports
- Network
- Data link
- Physical
