lp-wan / datamodel

use of yang to describe SCHC
1 stars 3 forks source link

Attacks impact - injecting destructive rules #15

Closed MarinoMtz closed 1 year ago

MarinoMtz commented 1 year ago
  1. Attack Impact : Ana: I don't see what you mean? The attack depends on the optimisation of compression? or only on the modification of the Rule information? IM: No, the attack does not depends on that, I'm talking about the impact of the attack. Hence, it depends on both. Let me explain: (a) The attack consist on trying to change a Rule that offers certain level of compression. (b) the possible rule that the compromised device is trying to push offers a grater level of compression, (c) if the new rule is effectively pushed and selected by the core, the impact of the attack is more important since there is a lost of information. IM You can classify the impact of an attack based on the CIA (Confidentiality, Integrity, and Availability) triad, an attack that only impacts the Availability is less serious than an attack that impacts the integrity.