Network stack (dode) - attack patterns on each layer & how to defend it

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
We are talking about the dode model here:
 
-
 
-
Dode:
 
- Application/Presentation
- Application/Presentation
-
- Session
 
-
- Transport: transports  
+
- Transport: transports packets to the correct protocol
 +
 
 +
 
 +
- Network:
 +
 
 +
IP: routed
 +
 
 +
IPX: not routed
 +
 
-
- Network
+
- Data link: Drive data to correct protocols
-
- Data link
 
-
- Physical
+
- Physical: mcaddress

Revision as of 18:17, 22 March 2008

- Application/Presentation


- Transport: transports packets to the correct protocol


- Network:

IP: routed

IPX: not routed


- Data link: Drive data to correct protocols


- Physical: mcaddress

Personal tools