Blogs
7 Cyber Security Red Flags that Your Website is Hacked
August 9, 2018How Affordable Dedicated Server Can Help You Polish Up Your Business Performance
August 30, 2018If you have previously worked in the telecommunication field, most vendors you come across make an attempt to explain products and services in terms of the OSI Model. For someone who has some background in the field of networking and communications can understand what the OSI Model is, but in case you don’t belong to the field, you need to develop a bit of an understanding. Although OSI models are important for carrying out discussions and conducting evaluative sessions, it is still not implemented in actual in most cases.
So, why particularly is it important to learn what the OSI Model is all about? When we talk about DDoS Attacks they usually target the very layers in the OSI model. Understanding the layers will eventually help users understand where the vulnerabilities lie and how can one keep the infrastructure protected. To give you a brief overview, the OSI model was originally developed by representatives of some of the major telecommunication companies in the year 1983. It was established as a common reference model which standardized the governance of transmission of data packets and was adopted as a standard by the ISO.
- Explaining the OSI Model Layers
- Layer 7: Application Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 6: The Presentation Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 5: The Session Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 4: The Transport Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 3: The Network Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 2: Data Link Layer
- Vulnerabilities to DDoS Attack
- Mitigation
- Layer 1: The Physical Layer
- Vulnerabilities to DDoS Attack
- Mitigation
Explaining the OSI Model Layers
The process of communication in networking is dependent on two endpoints. It can be divided into seven different layers based on their relative functions. In the OSI model architecture, each layer is dependent on the layer above it and is equally dependent on the layer below it. If the lower layer doesn’t fulfill the function, the consecutive layer will fail to get executed stopping the whole process in its wake. The data flows up from the source computer across the network and then ultimately flows down through the layers within the receiving computer.
Here is a graphical representation of the OSI Model specifying layers
Sending signals over a network using an Ethernet cable or fiber optic cable or WiFi requires a combination of application, operating systems, network card drivers and network hardware. These signals are delivered through seven layers of the function of the OSI Model.
Let’s discuss these seven layers in a top to bottom approach.
Layer 7: Application Layer
Layer 7 commonly known as the Application Layer is the layer where communication partners are identified. This is the database access level where end-user protocols such as FTP, Telnet, SMTP and RAS perform their respective functionalities. All messages and packet creations begin at this level. Here, the data is expressed visually so the user can understand. Although the layer is not the application itself, it contains a set of services an application can use.
Vulnerabilities to DDoS Attack
- PDF GET requests, HTTP GET, HTTP POST, = website forms (login, uploading photo/video, submitting feedback)
Mitigation
One way to counteract the DDoS attack possibility on Layer 7 is to bring monitoring software applications into practice. By using a set of dedicated algorithms and technologies which can detect zero-day attacks, effective application monitoring can stop and track back the source from where the attack initiated.
Layer 6: The Presentation Layer
Known as the Translator, the presentation layer or the Layer 6 is that part of the operating system (OS) which translates the data from the source format into a common format and then send it to the receiver and vice versa. It uses the protocol of compression and encryption during the transaction of information between users.
Vulnerabilities to DDoS Attack
- Malformed SSL Requests, Inspecting SSL encryption packets is resource intensive.
- Attackers use SSL to tunnel HTTP attacks to target the server.
Mitigation
One way to avoid this attack is to offload the SSL from the origin infrastructure. Once, you have successfully done that, it’s time to inspect the application traffic for any signs of malicious activities. Be sure to check up on any violations of policy at an application delivery platform (ADP). An effective ADP will also make sure that the traffic is re-encrypted and sent back to the origin infrastructure.
Layer 5: The Session Layer
This layer is responsible for establishment, coordination, and termination of sessions. In case, if there is any interruption in between the session process, this service reviews the authentication
and reconnect the layers together. Commonly, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) make the better use of this service when working with applications.
Vulnerabilities to DDoS Attack
Telnet DDoS-attacker exploits a flaw in a Telnet server software running on the switch, rendering Telnet services unavailable.
Mitigation
The only way to resolve this vulnerability is to keep your hardware up to date. Most commonly, the hardware provider issues a version update or a patch which enable users to mitigate the vulnerability.
Layer 4: The Transport Layer
The transport layer, on the other hand, is responsible for the packetization of data. It delivers packets of information error-free without observing any losses or duplication. For most applications running on the Internet, these services are provided by the TCP and UDP.
Vulnerabilities to DDoS Attack
SYN Flood, Smurf Attack
Mitigation
A typical method to stop from DDoS attacks taking place on this level is through blackholing. It is a method implied by the ISPs to stop any DDoS attack that a customer experience at the transport layer. However, this approach to keep the DDoS attack out of the system stops all traffic (malicious and legitimate) from getting into the system.
Layer 3: The Network Layer
The particular layer that handles the routing of data is termed as the network layer. It is also responsible for switching information from one network to another. It specifies the right destination for all transmission data at the packet level. IP is the most common example of a network layer operating on the Internet.
Vulnerabilities to DDoS Attack
ICMP Flooding – A Layer 3 infrastructure DDoS attack method that uses ICMP messages to overload the targeted network’s bandwidth.
Mitigation
You can prevent this kind of attack from taking place by rate-limiting ICMP traffic.
Layer 2: Data Link Layer
The Data-Link Layer is a protocol layer which transfers data frame in between nodes of the physical layer. It is responsible to conduct an error-free transfer which allows the layer above it to assume they are virtually error-free. The layer comprises two sub-layers namely;
- The logical link control layer
- The media access control layer (MAC)
Vulnerabilities to DDoS Attack
MAC flooding is an attack that inundates the network switch with data packets which usually takes place at the Data Link Layer.
Mitigation
Advance switches can be configured to limit the number of MAC addresses which are more likely to be learned on ports connected to end stations.
Layer 1: The Physical Layer
The physical layer is the bottom layer of the OSI model. It is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers, and repeaters.
Vulnerabilities to DDoS Attack
Physical destruction, obstruction, manipulation, or malfunction of physical assets
Mitigation
Practice defense-in-depth tactics, use access controls, accountability, and auditing to track and control physical assets
Featured Post
Cybersecurity Spending: 7 Areas CISOs Should Spend Their Cybersecurity Budgets In 2025
As we approach 2025, the landscape of cyber threats continues to evolve, necessitating a dynamic and strategic allocation of Cybersecurity Spending budgets. Chief Information Security Officers […]
Black Hat 2024: 10 Cybersecurity Tools That Deserve Your Attention
The Black Hat Cybersecurity tool landscape is ever-evolving, with new threats emerging constantly. To combat these challenges, cybersecurity vendors are continually innovating and developing new tools […]
7 Shocking Stats from IBM’s Cost of Data Breach Report 2024
The Cost of Data Breach Report 2024 by IBM provides an alarming snapshot of the current state of cyber threats and the financial impact on organizations. […]