Network stack (dode) - attack patterns on each layer & how to defend it

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
We are talking about the dode model here:
We are talking about the dode model here:
 +
 +
Dode:
 +
 +
- Application/Presentation
 +
 +
- Session
 +
 +
- Transport: transports
 +
 +
- Network
 +
 +
- Data link
 +
 +
- Physical

Revision as of 18:15, 22 March 2008

We are talking about the dode model here:

Dode:

- Application/Presentation

- Session

- Transport: transports

- Network

- Data link

- Physical

Personal tools