Review Article
Airborne Wireless Sensor Networks for Airplane Monitoring System
Table 5
Characteristics and countermeasures of attacks in various OSI layers.
| Attacks | Characteristics | OSI layer affected | Countermeasures |
| Malware attack | Trojan horse, worms, key-loggers, and viruses | Application | Firewalls and antiviruses | SQL injection | Acquiring unauthorized access to websites | Application | Firewalls and antiviruses | TCP flood | Sending massive ping requests | Transport | Reducing packets response | UDP flood | Sending massive UDP packets | Transport | Reducing packets response | IP hijacking | Legal users IP address impersonation | Routing | Firewalls | Smurf attack | Sending massive ICMP requests | Routing | Reducing packets response | Mac spoofing | MAC addresses falsification | MAC | ARP packets | MITM attack | Communicating nodes impersonation | MAC | Virtual private networks (VPNs) | Jamming attack | Interrupting legal data transmission | Physical | Spread spectrum techniques | Denial of service | Sending abundant packets | Physical | Temper-proof packaging |
|
|