OSI Layer 4 Transport:

Protocols at layer 4 include:

  • Transmission control protocol (TCP)connection oriented for data management and reliable data transfer
  • User datagram protocol (UDP) connectionless data transfer with no error detection/correction

Vulnerabilities, threats, and mitigations at layer 4:

  • SYN flood – protocol inspection for RFC conformance, anomaly detection, deep packet inspection
  • Fraggle – prevent router from forwarding request to network directed broadcast address

OSI Layer 5 Session

The session layer is responsible for the establishing, maintaining, and ending of sessions between hosts.  No inherent security exists in this layer, but can be applied at a layer above or below. Risky protocols can be encrypted to reduce the risk.

Protocols:

  • Password authentication protocol (PAP)
  • Point-to-point tunneling protocol (P2PTP)
  • Remote procedure protocol 

Termination refers to when the sending station completes a transfer. For those of you who don’t work in Domain 4, this is similar to the TCP handshake process to start a connection, but instead follows the FIN, AckFIN (or FINACK if it’s easier to remember it backwards), followed by ACK.