Security Threats and Vulnerabilities in the OSI Model's Physical, Data Link and Network Layers
Mohammad Ehsanul Alim
Ph.D. Candidate at Monash University | Cybersecurity & Health Informatics Researcher | Data Science, Information Technology & Generative AI Enthusiast | AISA Associate Member
The OSI Model, developed in the late 1970s by the International Organization for Standardization (ISO), divides complicated networking ideas into seven layers. The first three layers of the OSI model – Physical, Data Link, and Network are primarily responsible for managing the physical and logical transmission and routing of data, rather than managing the actual data being transmitted and the services provided by the network. The Physical Layer is the foundation of the OSI Model and its first layer. Vulnerabilities at this level not only include malicious threats such as physical tampering and eavesdropping, but also natural or environmental threats such as temperature, humidity, and even electrical interference from other equipment.
The OSI model’s second layer, the Data Link Layer, is made up of protocols that ensure reliable data transmission between directly connected nodes on a network. These protocols establish, maintain, and terminate connections, and handle error correction and flow control. Common Data Link Layer attacks include: Media Access Control (MAC) Spoofing attacks, in which attackers modify the MAC address of their device to mimic that of an authorized user and gain access to the network. Address Resolution Protocol (ARP) Spoofing or poisoning attacks, in which attackers modify the ARP tables on a network, redirecting network traffic to their own devices or stealing data. STP (Spanning Tree Protocol) spoofing attacks in which attackers send falsified data to a switch on a network, pretending to be a root bridge or causing the switch to believe that it has lost its connection to the root bridge. This can cause the switch to reconfigure the network topology, resulting in a DoS (Denial-of-Service) attack or allowing the attacker to gain unauthorized access to the network.
The third layer of the OSI Model is the Network Layer, which is responsible for routing data between different sections of a network, or for routing data between different networks. The primary role of the Network Layer lies in determining the most efficient paths for data transmission in order to ensure optimal network performance. Common threats to the Network Layer include IP Spoofing Attacks in which an attacker sends a packet with a forged IP address from a trusted source in order to bypass access controls or launch attacks against other devices on the network. In Denial-of-Service (DoS) Attacks, attackers flood a network with junk traffic or requests in order to overwhelm network resources and ultimately cause downtime. Lastly,Man-in-the-Middle (MitM) Attacks, in which an attacker intercepts and potentially modifies network traffic between two devices, in order to eavesdrop on sensitive information or inject malicious code into the network.