Network Protocol Theory Flashcards
What is the TCP/IP model
The TCP/IP model, also known as the Internet Protocol Suite, is a more practical framework developed by the U.S. Department of Defense. It is designed to ensure successful communication over the internet and consists of four layers.
What are the OSI model layers
- Physical Layer: Deals with the physical connection between devices and the transmission of binary data over physical mediums.
- Data Link Layer: Handles error detection and correction, as well as frame synchronization.
- Network Layer: Manages logical addressing, routing, and packet forwarding.
- Transport Layer: Provides reliable data transfer, flow control, and error recovery.
- Session Layer: Manages sessions or connections between applications.
- Presentation Layer: Ensures data is in a readable format and handles encryption and compression.
- Application Layer: Interfaces directly with user applications, providing network services.
What is the OSI models
The OSI (Open Systems Interconnection) model is a conceptual framework created by the International Organization for Standardization (ISO) to standardize the functions of a telecommunication or computing system into seven distinct layers. Each layer serves specific functions and communicates with the layers directly above and below it.
What is the relation between the OSI model and the TCP/IP model
- Conceptual Layers: The OSI model is more theoretical and detailed, with seven layers, whereas the TCP/IP model is more practical and simplified, with four layers.
- Layer Mapping:
• OSI Physical and Data Link Layers correspond to the TCP/IP Link Layer.
• OSI Network Layer corresponds to the TCP/IP Internet Layer.
• OSI Transport Layer is the same as the TCP/IP Transport Layer.
• OSI Session, Presentation, and Application Layers are combined into the TCP/IP Application Layer. - Usage: The OSI model is used primarily as a teaching and troubleshooting tool to understand and design network protocols. The TCP/IP model is the basis for the actual implementation of the Internet and related protocols.
- Development: The OSI model was developed by the ISO, a global standards organization, while the TCP/IP model was developed by the U.S. Department of Defense and is the foundation of the Internet’s architecture.
What are the TCP/IP layers
- Link Layer (Network Interface Layer): Corresponds to the OSI’s Physical and Data Link layers. It deals with the physical transmission of data.
- Internet Layer: Maps to the OSI’s Network layer. It handles logical addressing and routing (mainly using the IP protocol).
- Transport Layer: Aligns with the OSI’s Transport layer. It ensures reliable data transfer through protocols like TCP and UDP.
- Application Layer: Combines the functions of the OSI’s Session, Presentation, and Application layers. It includes protocols such as HTTP, FTP, SMTP, etc.
What are the main protocols for each layer in the OSI model?
OSI Model
• Physical Layer: Ethernet, DSL, ISDN, USB, Bluetooth, Wi-Fi
• Data Link Layer: Ethernet, PPP, HDLC, Frame Relay, ATM, ARP
• Network Layer: IP, ICMP, IGMP, IPsec
• Transport Layer: TCP, UDP, SCTP, DCCP
• Session Layer: NetBIOS, PPTP, RPC
• Presentation Layer: SSL/TLS, JPEG, GIF, MPEG, ASCII, EBCDIC
• Application Layer: HTTP, FTP, SMTP, DNS, SNMP, Telnet, SSH, IMAP, POP3, NTP
What is packaging capsulation and what it is used for?
Packet encapsulation is the process of enclosing data with protocol-specific information at each layer of the TCP/IP model. This method ensures that data can be transmitted across networks and interpreted correctly by the receiving device.
How does the pack encapsulation works?
- Application Layer: Generates data and adds application-specific headers.
• Example: HTTP data
• Encapsulation: [HTTP data] - Transport Layer: Encapsulates application layer data within a transport layer segment (TCP/UDP).
• Example: TCP header + HTTP data
• Encapsulation: [TCP header + HTTP data] - Internet Layer: Encapsulates the transport layer segment within an IP packet.
• Example: IP header + [TCP header + HTTP data]
• Encapsulation: [IP header + TCP header + HTTP data] - Link Layer: Encapsulates the IP packet within a link layer frame for transmission.
• Example: Ethernet header + [IP header + TCP header + HTTP data] + Ethernet trailer
• Encapsulation: [Ethernet header + IP header + TCP header + HTTP data + Ethernet trailer]
What are the addresses used for each layer in the TCP/IP model?
Each layer has its own addressing structure
○ Data link layer: MAC address (for Ethernet)
■ A globally unique address “burnt” in the NIC
■ The ARP protocol maps an IP address to a MAC
addr
○ Internet layer: IP address
■ Identifies “globally” a network host
■ There can be private addresses (RFC1918 for
IPv4)
○ Transport layer: port
■ Identifies a specific service on a host
What are the main characteristics of UDP protocol?
- Connectionless: Unlike TCP, UDP does not establish a connection before sending data. Each UDP datagram is treated as an independent message, and there is no handshake or acknowledgment mechanism.
- Unreliable: UDP does not guarantee delivery or order of datagrams. It does not perform error checking or retransmission of lost packets. If reliability is needed, it must be implemented at the application layer.
- Minimal Overhead: UDP has a smaller header size compared to TCP, which reduces overhead. This makes UDP suitable for applications where low latency and efficiency are more important than reliability.
What are the main characteristics of the TCP protocol?
- Connection-Oriented: TCP establishes a connection between the sender and receiver before transmitting data. This connection is maintained until all data has been exchanged, and it ensures that data is delivered in order and without loss or duplication.
- Reliable Delivery: TCP guarantees the reliable delivery of data by using acknowledgments, sequence numbers, and retransmissions. It ensures that data is delivered correctly and in the same order it was sent.
- Three-Way Handshake: TCP uses a three-way handshake to establish a connection. This process involves the exchange of SYN (synchronize) and ACK (acknowledge) packets between the client and server to synchronize sequence numbers and establish communication parameters.
What are the typical network protocol attacks?
Denial of service (against availability)
Sniffing (against confidentiality)
Spoofing (against integrity and authenticity)
What are some examples of network protocol attacks that promotes denial of service
Killer packets
SYN flood
Smurf, multiplication or amplification attacks
Distributed DoS
To witch taxonomy killer packets belong to and what are some examples of this type of attack
It belongs to the denial of service taxonomy
The examples are ping of death, teardrop, land attack
To each type of denial of service attack, the ping of death belongs to and how does it works?
The “Ping of Death” attack is a type of cyber attack that exploits vulnerabilities in the way some computer systems handle ICMP (Internet Control Message Protocol) packets, particularly ICMP Echo Request packets (commonly known as “ping” packets).
- Normal ICMP Echo Request: Normally, when you send a “ping” command from one computer to another, it sends a small ICMP Echo Request packet to the target computer, asking it to respond with an ICMP Echo Reply packet. This is a common way to test network connectivity and measure response times.
- Oversized ICMP Packet: In a Ping of Death attack, the attacker manipulates the ICMP packet to make it much larger than the standard maximum size allowed by the Internet Protocol (IP). Typically, the maximum size for an IP packet is 65,535 bytes, but older systems may not properly handle packets of this size.
- Buffer Overflow: When the oversized ICMP packet is received by the target computer, its network stack may not be able to handle the packet properly. This can lead to a buffer overflow, where the data in the packet overflows the buffer allocated to store it. As a result, the system may crash, become unresponsive, or exhibit other unexpected behavior.
- Denial of Service (DoS): The goal of the Ping of Death attack is often to disrupt the target computer or network by causing it to crash or become unavailable. By sending a series of oversized ICMP packets, the attacker can overwhelm the target system’s resources, leading to a denial of service (DoS) condition where legitimate users are unable to access the system or network services.
To what type of denial of service attack the teardrop attack belongs to and how does it works?
The “Teardrop” attack is a type of cyber attack that exploits vulnerabilities in the way some computer systems handle fragmented IP packets. Here’s a simple explanation of how the Teardrop attack works:
- IP Packet Fragmentation: When data is sent over a network, it is divided into smaller units called packets. If the size of the data exceeds the maximum transmission unit (MTU) of the network, the data is fragmented into smaller packets for transmission.
- Fragmented Packets: In the Teardrop attack, the attacker manipulates the fragments of an IP packet to create overlapping or malformed fragments. Specifically, the attacker sends a series of fragmented packets where the offset and length fields are manipulated in such a way that when the packets are reassembled by the target system, they overlap or conflict with each other.
- Reassembly Vulnerability: When the target system receives the maliciously crafted fragmented packets, it attempts to reassemble them into the original complete packet. However, due to the overlapping or conflicting fragments, the system may encounter errors or inconsistencies during the reassembly process.
- System Crash or Unresponsiveness: If the target system’s network stack is unable to handle the overlapping or conflicting fragments properly, it may crash, become unresponsive, or exhibit other unexpected behavior. This can lead to a denial of service (DoS) condition where legitimate users are unable to access the system or network services.
To what type of denial of service attack the land attack belongs to and how does it works?
Killer packets attack
The “Land” attack is a type of cyber attack that exploits vulnerabilities in the TCP/IP protocol stack to disrupt network communication. Here’s a simple explanation of how the Land attack works:
- TCP/IP Handshake: When two computers communicate over a network using the TCP/IP protocol, they establish a connection through a process called a three-way handshake. During this handshake, the client sends a SYN (synchronize) packet to the server, and the server responds with a SYN-ACK (synchronize-acknowledge) packet, and finally, the client sends an ACK (acknowledge) packet to confirm the connection.
- Spoofed SYN Packets: In a Land attack, the attacker sends spoofed SYN packets to the target system. These SYN packets are crafted to appear as if they are coming from the target system itself, with the source IP address and port set to match the destination IP address and port.
- TCP Connection Loop: When the target system receives the spoofed SYN packets, it attempts to establish a TCP connection with itself. However, because the source IP address and port of the SYN packets match the destination IP address and port, the target system becomes stuck in a loop, continuously attempting to establish a connection with itself.
- Resource Exhaustion: As the target system becomes stuck in the TCP connection loop, it consumes system resources such as CPU cycles, memory, and network bandwidth. This can eventually lead to a denial of service (DoS) condition, where the system becomes overwhelmed and unable to respond to legitimate network requests.