Network stack (dode) - attack patterns on each layer & how to defend it
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
We are talking about the dode model here: | We are talking about the dode model here: | ||
+ | |||
+ | Dode: | ||
+ | |||
+ | - Application/Presentation | ||
+ | |||
+ | - Session | ||
+ | |||
+ | - Transport: transports | ||
+ | |||
+ | - Network | ||
+ | |||
+ | - Data link | ||
+ | |||
+ | - Physical |
Revision as of 18:15, 22 March 2008
We are talking about the dode model here:
Dode:
- Application/Presentation
- Session
- Transport: transports
- Network
- Data link
- Physical