OSI Model and Security Attacks
OSI Model and Security Attacks
Boni Yeamin
Cyber Security Engineer
Akij Group,
Bangladesh
[email protected]
akijgroup.co
Table of Contents
1. Introduction
5. Conclusion
Introduction
This document provides an overview of the OSI Model, outlines security attacks that may occur at each layer, and
presents methods for preventing these attacks. Understanding the risks and mitigation strategies for each OSI layer
helps in building a secure network architecture for your organization.
The OSI (Open Systems Interconnection) model is a framework that categorizes communication protocols into seven
distinct layers. Each layer serves a specific function in the process of transmitting data over a network, from the
physical transmission of signals to the presentation of data to end users.
1. Physical Layer – Deals with the physical transmission of data over network media.
2. Data Link Layer – Handles data frame transmission between adjacent nodes.
6. Presentation Layer – Translates, encrypts, or compresses data for the application layer.
Attacks:
Prevention:
Attacks:
• MAC Spoofing: Attacker impersonates another device by changing its MAC address.
• ARP Spoofing: Manipulating ARP tables to reroute traffic through an attacker’s machine.
Prevention:
Attacks:
Prevention:
Attacks:
Prevention:
Attacks:
• Session Fixation: Attacker sets a known session ID, then hijacks the session.
Prevention:
Attacks:
Prevention:
Attacks:
• Cross-Site Scripting (XSS): Attacker injects malicious scripts into web applications.
• Phishing: Deceptive emails or websites to trick users into giving away credentials.
Prevention:
• Use Web Application Firewalls (WAF) to monitor and block malicious requests.
• Employ secure coding practices, such as input sanitization and parameterized queries.
o Isolate critical assets by creating separate VLANs or subnets to reduce the spread of attacks.
2. Multi-layered Defense:
o Implement multiple security solutions such as firewalls, IDS/IPS, and endpoint protection at various
OSI layers.
o Conduct regular vulnerability scans and penetration tests. Ensure all software and hardware are up
to date with the latest security patches.
4. Employee Training:
o Train employees to recognize social engineering and phishing attacks, use strong passwords, and
apply security protocols.
o Adopt a Zero Trust model, where every user and device must be authenticated and verified before
being granted access to any resource.
Conclusion
By understanding the different types of attacks at each layer of the OSI model and implementing the appropriate
preventive measures, organizations can build robust defenses against various cybersecurity threats. A well-rounded
strategy that combines technology, employee training, and security policies will ensure that your organization
remains protected from malicious actors.