Skip to main content
OSI Security Architecture - Part 1
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/
  6. Cyber Security Slidev Presentations/

OSI Security Architecture - Part 1

·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

OSI Security Architecture - Part 1
#

Unit I: Introduction to Cyber Security & Cryptography
#

Lecture 5: Network Layer Security Framework
#

Course: Cyber Security (4353204) | Semester V | Diploma ICT | Author: Milav Dabgar

layout: default
#

Recap: Previous Lectures
#

๐Ÿ”„ What We’ve Covered
#

Lecture 1: Introduction
#

  • Cyber security fundamentals
  • Current threat landscape
  • Career opportunities

Lecture 2: CIA Triad
#

  • Confidentiality, Integrity, Availability
  • Security principles and design
  • Real-world applications

Lecture 3: Terminology
#

  • Key security vocabulary
  • Threat modeling concepts
  • Risk management basics

Lecture 4: Advanced Concepts
#

  • Security policies and governance
  • Asset management
  • Vulnerability lifecycle

๐ŸŽฏ Today’s Focus
#

Understanding security from a network architecture perspective

Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

OSI Model: Foundation of Network Communication
#

๐Ÿ“š What is the OSI Model?
#

The Open Systems Interconnection (OSI) reference model is a conceptual framework that standardizes network communication functions into seven distinct layers.

๐ŸŽฏ Purpose
#

  • Standardize network protocols
  • Enable interoperability between systems
  • Simplify network troubleshooting
  • Guide security implementation

๐Ÿ“ˆ Benefits for Security
#

  • Layer-specific threat analysis
  • Targeted security controls
  • Comprehensive protection strategy
  • Clear responsibility boundaries

๐Ÿ—๏ธ The Seven Layers
#

graph TB
    A[7. Application] --> B[6. Presentation]
    B --> C[5. Session]
    C --> D[4. Transport]
    D --> E[3. Network]
    E --> F[2. Data Link]
    F --> G[1. Physical]
    
    style A fill:#e3f2fd
    style B fill:#f3e5f5
    style C fill:#e8f5e8
    style D fill:#fff3e0
    style E fill:#fce4ec
    style F fill:#e0f2f1
    style G fill:#f1f8e9

๐Ÿง  Memory Aid
#

“All People Seem To Need Data Processing”

  • Application, Presentation, Session
  • Transport, Network, Data Link, Physical
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Layer 1: Physical Layer Security
#

โšก Physical Layer Overview
#

๐Ÿ”ง What It Does
#

  • Transmits raw binary data
  • Manages electrical signals
  • Controls hardware interfaces
  • Handles cable and wireless transmission

๐ŸŒ Components
#

  • Cables (fiber, copper, coaxial)
  • Wireless signals and frequencies
  • Network adapters and interfaces
  • Repeaters and hubs
  • Physical connectors

๐Ÿ“Š Key Characteristics
#

  • No addressing or routing
  • Bit-level transmission
  • Hardware dependent
  • Foundation for all higher layers

๐Ÿšจ Physical Layer Threats
#

๐Ÿ‘ฅ Physical Access Attacks
#

  • Cable tapping - Intercepting signals
  • Electromagnetic eavesdropping (TEMPEST)
  • Hardware tampering
  • Device theft
  • Facility intrusion

๐ŸŒŠ Environmental Threats
#

  • Power outages and surges
  • Natural disasters
  • Temperature/humidity extremes
  • Electromagnetic interference (EMI)

๐Ÿ›ก๏ธ Physical Layer Countermeasures
#

  • Secure facilities with access control
  • Cable protection (conduits, underground)
  • EMI shielding and Faraday cages
  • Uninterruptible Power Supply (UPS)
  • Environmental monitoring
  • Tamper-evident seals and devices
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Layer 2: Data Link Layer Security#

๐Ÿ”— Data Link Layer Overview#

๐ŸŽฏ Primary Functions
#

  • Frame formation from bits
  • Error detection and correction
  • Flow control between adjacent nodes
  • MAC addressing for local delivery

๐Ÿ—๏ธ Sub-layers
#

  • LLC (Logical Link Control)
    • Error recovery
    • Flow control
    • Interface to Network layer
  • MAC (Media Access Control)
    • Frame addressing
    • Channel access control

๐Ÿ“‹ Key Protocols
#

  • Ethernet (IEEE 802.3)
  • Wi-Fi (IEEE 802.11)
  • Bluetooth (IEEE 802.15)
  • Token Ring (IEEE 802.5)

โš ๏ธ Data Link Layer Threats#

๐ŸŽญ MAC Address Attacks
#

  • MAC spoofing - Impersonating devices
  • MAC flooding - Switch table overflow
  • CAM table attacks - Memory exhaustion

๐Ÿ“ก Wireless Attacks
#

  • War driving - Unauthorized access scanning
  • Rogue access points - Fake wireless networks
  • Jamming - Signal interference
  • Bluetooth attacks - Bluejacking, bluesnarfing

๐Ÿ”ง Switching Attacks
#

  • VLAN hopping - Unauthorized VLAN access
  • STP manipulation - Spanning Tree attacks
  • ARP poisoning - Address resolution attacks
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Data Link Layer: Ethernet Security#

๐ŸŒ Ethernet Frame Structure
#

|Preamble|Dest MAC|Src MAC|Type|Data|FCS|
|   8B   |   6B   |  6B   | 2B |Variable|4B|

๐Ÿ” Security Considerations
#

  • MAC addresses are easily spoofed
  • Broadcast nature enables eavesdropping
  • No built-in authentication or encryption
  • Switch learning can be exploited

๐Ÿšจ Common Ethernet Attacks
#

MAC Flooding Attack
#

# Attacker floods switch with fake MAC addresses
for i in {1..65000}; do
    send_frame(random_mac(), target_port)
done
# Result: Switch fails open to hub mode

๐Ÿ›ก๏ธ Ethernet Security Countermeasures
#

๐Ÿ”’ Port Security
#

  • MAC address binding to ports
  • Maximum MAC address limits
  • Violation actions (shutdown, restrict, protect)
  • Sticky MAC learning

๐ŸŽฏ VLAN Security
#

  • Network segmentation
  • Private VLANs for isolation
  • VLAN Access Control Lists
  • 802.1X authentication

๐Ÿ“Š Monitoring and Detection
#

  • Network monitoring tools
  • Anomaly detection systems
  • MAC address tracking
  • Switch security features
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Layer 3: Network Layer Security
#

๐ŸŒ Network Layer Overview
#

๐ŸŽฏ Core Functions
#

  • Routing packets between networks
  • Logical addressing (IP addresses)
  • Path determination across networks
  • Packet forwarding
  • Fragmentation and reassembly

๐Ÿ“‹ Key Protocols
#

  • IPv4/IPv6 - Internet Protocol
  • ICMP - Internet Control Message Protocol
  • ARP - Address Resolution Protocol
  • RIP, OSPF, BGP - Routing protocols

๐Ÿ—๏ธ Network Devices
#

  • Routers - Inter-network communication
  • Layer 3 switches - High-speed routing
  • Firewalls - Security gateways

๐Ÿšจ Network Layer Threats
#

๐Ÿ“ IP-Based Attacks
#

  • IP spoofing - Fake source addresses
  • Routing attacks - Protocol manipulation
  • ARP spoofing - Address resolution poisoning
  • ICMP attacks - Protocol abuse

๐ŸŒ Routing Vulnerabilities
#

  • Route hijacking - Traffic misdirection
  • Black hole attacks - Traffic dropping
  • Distance vector attacks
  • Link-state database corruption

๐ŸŽฏ Advanced Threats
#

  • DDoS attacks - Distributed denial of service
  • Man-in-the-middle - Traffic interception
  • Smurf attacks - ICMP amplification
  • Fragmentation attacks
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Network Layer: IP Security Deep Dive
#

๐Ÿ“ฆ IPv4 Header Analysis
#

 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version|  IHL  |Type of Service|          Total Length         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         Identification        |Flags|      Fragment Offset    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Time to Live |    Protocol   |         Header Checksum       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                       Source Address                          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Destination Address                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

๐Ÿ” Security Vulnerabilities
#

  • Source address easily spoofed
  • No authentication mechanism
  • No encryption of payload
  • Fragmentation can hide attacks

๐Ÿ›ก๏ธ Network Layer Security Solutions
#

๐Ÿ”’ IPSec Protocol Suite
#

  • Authentication Header (AH)

    • Data integrity
    • Source authentication
    • Anti-replay protection
  • Encapsulating Security Payload (ESP)

    • Data confidentiality
    • Optional authentication
    • Optional anti-replay

๐Ÿšช IPSec Modes
#

  • Transport Mode

    • Protects payload only
    • End-to-end security
    • Host-to-host communication
  • Tunnel Mode

    • Protects entire packet
    • Gateway-to-gateway
    • VPN implementations

๐Ÿ”ง Additional Countermeasures
#

  • Ingress/Egress filtering
  • Route authentication
  • Network segmentation
  • Intrusion detection systems
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Layer 4: Transport Layer Security
#

๐Ÿš› Transport Layer Overview
#

๐ŸŽฏ Core Responsibilities
#

  • End-to-end communication
  • Reliability and error recovery
  • Flow control and congestion control
  • Port-based service addressing
  • Connection management

๐Ÿ“‹ Key Protocols
#

  • TCP (Transmission Control Protocol)

    • Reliable, connection-oriented
    • Acknowledgments and retransmission
    • Flow and congestion control
  • UDP (User Datagram Protocol)

    • Unreliable, connectionless
    • Low overhead
    • Real-time applications

๐Ÿ”ข Port Numbers
#

  • Well-known ports (0-1023)
  • Registered ports (1024-49151)
  • Dynamic/Private ports (49152-65535)

โš ๏ธ Transport Layer Threats
#

๐ŸŽญ TCP-Specific Attacks
#

  • SYN flooding - Connection state exhaustion
  • TCP hijacking - Session takeover
  • Sequence number prediction
  • RST attacks - Connection termination
  • TCP steganography - Covert channels

๐Ÿ“ก UDP-Based Attacks
#

  • UDP flooding - Bandwidth exhaustion
  • UDP amplification - Reflection attacks
  • Spoofed UDP packets
  • Port scanning via UDP

๐ŸŒŠ General Transport Attacks
#

  • Port scanning - Service discovery
  • Banner grabbing - Service fingerprinting
  • Connection flooding - Resource exhaustion
  • Covert channels - Hidden communication
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Transport Layer: TCP Security Analysis
#

๐Ÿค TCP Three-Way Handshake
#

sequenceDiagram
    participant C as Client
    participant S as Server
    
    C->>S: SYN (seq=x)
    S->>C: SYN-ACK (seq=y, ack=x+1)
    C->>S: ACK (seq=x+1, ack=y+1)
    
    Note over C,S: Connection Established

๐Ÿ” Security Implications
#

  • State tracking required on server
  • Sequence numbers must be unpredictable
  • Resource allocation on SYN reception
  • Connection state stored in memory

๐Ÿ’ฅ SYN Flood Attack
#

Attack Process
#

  1. Attacker sends massive SYN packets
  2. Server allocates connection state
  3. Server waits for ACK (never comes)
  4. Connection table fills up
  5. Legitimate connections rejected

๐Ÿ›ก๏ธ TCP Security Countermeasures
#

๐Ÿ”’ SYN Flood Protection
#

  • SYN cookies - Stateless connection tracking
  • Rate limiting - Connection attempts per IP
  • SYN proxy - Intermediate validation
  • Connection timeouts - Faster cleanup

๐Ÿ“Š Example: SYN Cookies
#

# Simplified SYN cookie generation
def generate_syn_cookie(src_ip, src_port, dst_port, timestamp):
    secret = get_server_secret()
    cookie = hash(src_ip + src_port + dst_port + timestamp + secret)
    return cookie & 0xFFFFFFFF

# Validation on ACK
def validate_syn_cookie(cookie, src_ip, src_port, dst_port, timestamp):
    expected = generate_syn_cookie(src_ip, src_port, dst_port, timestamp)
    return cookie == expected

๐Ÿ”ง Additional Protections
#

  • Firewall connection tracking
  • Intrusion detection systems
  • Load balancing and rate limiting
  • Network segmentation
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Cross-Layer Security Considerations
#

๐Ÿ”— Layer Interactions
#

๐Ÿ“Š Security Dependencies
#

graph TD
    A[Application Security] --> B[Presentation Security]
    B --> C[Session Security]
    C --> D[Transport Security]
    D --> E[Network Security]
    E --> F[Data Link Security]
    F --> G[Physical Security]
    
    style A fill:#e3f2fd
    style B fill:#f3e5f5
    style C fill:#e8f5e8
    style D fill:#fff3e0
    style E fill:#fce4ec
    style F fill:#e0f2f1
    style G fill:#f1f8e9

๐ŸŽฏ Defense in Depth Principle
#

  • Each layer provides protection
  • Failure at one layer doesn’t compromise all
  • Redundant controls increase security
  • Comprehensive coverage of attack vectors

๐Ÿšจ Multi-Layer Attack Scenarios
#

๐Ÿ“ก Example: Wi-Fi Attack Chain
#

  1. Physical - War driving to find networks
  2. Data Link - WEP/WPA cracking
  3. Network - ARP spoofing for MITM
  4. Transport - TCP session hijacking
  5. Application - Credential theft

๐Ÿ›ก๏ธ Layered Defense Strategy
#

  • Physical - Secure facilities
  • Data Link - WPA3 encryption
  • Network - VPN tunneling
  • Transport - TLS encryption
  • Application - Strong authentication

๐Ÿ“ˆ Security Benefits
#

  • Early attack detection
  • Attack chain disruption
  • Reduced impact of breaches
  • Better incident response
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Security Protocols by Layer
#

๐Ÿ”’ Layer-Specific Security Protocols
#

Layer 1 (Physical)
#

  • Fiber optic cables (hard to tap)
  • Spread spectrum radio
  • Tempest shielding
  • Physical access controls

Layer 2 (Data Link)#

  • WEP/WPA/WPA3 (Wi-Fi security)
  • 802.1X (Port-based authentication)
  • MACsec (MAC security)
  • PPP authentication (CHAP/PAP)

Layer 3 (Network)
#

  • IPSec (IP security)
  • GRE (Generic Routing Encapsulation)
  • L2TP (Layer 2 Tunneling Protocol)

Layer 4 (Transport)
#

  • TLS/SSL (Transport Layer Security)
  • SSH (Secure Shell)

๐Ÿ“Š Protocol Comparison Matrix
#

LayerProtocolAuthenticationEncryptionKey Management
2WPA3โœ… Strongโœ… AESโœ… SAE
2802.1Xโœ… EAPโŒ Noโœ… RADIUS
3IPSecโœ… IKEโœ… AES/3DESโœ… IKE
4TLSโœ… Certificatesโœ… AESโœ… Handshake

๐ŸŽฏ Selection Criteria
#

  • Security requirements
  • Performance impact
  • Implementation complexity
  • Interoperability needs
  • Management overhead

๐Ÿ’ก Best Practices
#

  • Multiple layer protection
  • Protocol compatibility checking
  • Regular security updates
  • Key management planning
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Practical Exercise: Layer Security Analysis
#

๐ŸŽฏ Group Activity (20 minutes)
#

Scenario: Corporate Network Security Audit
#

Your team is conducting a security assessment of a corporate network with:

  • 1000 employees across 3 buildings
  • Wireless and wired infrastructure
  • Internet connectivity via ISP
  • Web servers in DMZ
  • Internal servers for file/email/database

Task: Layer-by-Layer Analysis
#

For each of the first 4 OSI layers, identify:

  1. Layer 1 (Physical):

    • What physical threats exist?
    • What security controls are needed?
    • How would you secure the infrastructure?
  2. Layer 2 (Data Link):

    • What switching vulnerabilities exist?
    • How would you secure wireless access?
    • What monitoring is needed?
  3. Layer 3 (Network):

    • What routing security issues exist?
    • How would you implement network segmentation?
    • What firewall rules are needed?
  4. Layer 4 (Transport):

    • What transport-level attacks are possible?
    • How would you secure different services?
    • What monitoring would you implement?
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Network Security Architecture Best Practices
#

๐Ÿ—๏ธ Design Principles
#

๐ŸŽฏ Defense in Depth
#

  • Multiple security layers
  • Redundant controls
  • Fail-safe mechanisms
  • Comprehensive coverage

๐Ÿšซ Zero Trust Network
#

  • Never trust, always verify
  • Assume breach mentality
  • Microsegmentation
  • Continuous monitoring

๐Ÿ“Š Network Segmentation
#

  • DMZ zones for public services
  • Internal networks by function
  • Guest networks isolation
  • Management networks separation

๐Ÿ”ง Implementation Guidelines
#

๐Ÿ“‹ Security Controls Checklist
#

  • Physical security of network infrastructure
  • Network device hardening and updates
  • Access control and authentication
  • Encryption for sensitive communications
  • Monitoring and logging systems
  • Incident response procedures
  • Regular security assessments
  • Staff training on network security

๐ŸŽฏ Monitoring Strategy
#

  • Real-time network traffic analysis
  • Anomaly detection systems
  • Security incident correlation
  • Threat intelligence integration
  • Regular vulnerability assessments
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: default
#

Next Lecture Preview
#

๐Ÿ”œ Lecture 6: OSI Security Architecture - Part 2
#

๐ŸŽฏ Focus Topics:
#

  • Session Layer security (Layer 5)
  • Presentation Layer security (Layer 6)
  • Application Layer security (Layer 7)
  • End-to-end security implementation
  • Security protocol integration

๐Ÿ“ Preparation Tasks:
#

  • Review today’s Layer 1-4 concepts
  • Research common application protocols
  • Think about session management security
  • Consider encryption and data formatting

๐ŸŽ“ Key Takeaways Today
#

Network Security Foundations
#

  • OSI model provides security framework
  • Each layer has unique vulnerabilities
  • Layered defense is most effective
  • Cross-layer attacks require comprehensive protection

Critical Concepts
#

  • Physical security is the foundation
  • Data link attacks target local networks
  • Network layer handles routing security
  • Transport layer manages reliable delivery
  • Defense in depth principle applies
Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: center class: text-center
#

Questions & Discussion
#

๐Ÿค” Discussion Points:
#

  • Which OSI layer presents the biggest security challenges?
  • How do layer interactions affect security design?
  • What are the trade-offs between security and performance?

๐Ÿ’ก Exercise Review
#

Share your findings from the layer security analysis

Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar

layout: center class: text-center
#

Thank You!
#

Next Lecture: OSI Security Architecture - Part 2
#

Completing the Upper Layers (5-7)
#

Cyber Security (4353204) - Lecture 5 Complete

Layer by layer, we build security! ๐Ÿ—๏ธ๐Ÿ”’

Course: Cyber Security (4353204) | Unit I | Lecture 5 | Author: Milav Dabgar