Skip to main content

Table 1 PTP Attack Strategies

From: Precision time protocol attack strategies and their resistance to existing security extensions

NO Attack Strategy
1 Packet Content Manipulation Attack
2 Packet Removal Attack
3 Packet Delay Manipulation Attack
4 Time Source Degradation Attack
5 Master Spoofing Attack
6 Slave Spoofing Attack
7 Replay Attack
8 BMCA Attack
9 Denial of Service Attack