Skip to main content

Table 1 PTP Attack Strategies

From: Precision time protocol attack strategies and their resistance to existing security extensions

NO

Attack Strategy

1

Packet Content Manipulation Attack

2

Packet Removal Attack

3

Packet Delay Manipulation Attack

4

Time Source Degradation Attack

5

Master Spoofing Attack

6

Slave Spoofing Attack

7

Replay Attack

8

BMCA Attack

9

Denial of Service Attack