Review Article

Airborne Wireless Sensor Networks for Airplane Monitoring System

Table 5

Characteristics and countermeasures of attacks in various OSI layers.

AttacksCharacteristicsOSI layer affectedCountermeasures

Malware attackTrojan horse, worms, key-loggers, and virusesApplicationFirewalls and antiviruses
SQL injectionAcquiring unauthorized access to websitesApplicationFirewalls and antiviruses
TCP floodSending massive ping requestsTransportReducing packets response
UDP floodSending massive UDP packetsTransportReducing packets response
IP hijackingLegal users IP address impersonationRoutingFirewalls
Smurf attackSending massive ICMP requestsRoutingReducing packets response
Mac spoofingMAC addresses falsificationMACARP packets
MITM attackCommunicating nodes impersonationMACVirtual private networks (VPNs)
Jamming attackInterrupting legal data transmissionPhysicalSpread spectrum techniques
Denial of serviceSending abundant packetsPhysicalTemper-proof packaging