Skip to main content

Table 5 PTP IEEE-1588 2008 TLVs that can be used to cover tracks of a PTP attack

From: Time sensitive networking security: issues of precision time protocol and its implementation

TLV name

Scope

Score

FAULT_LOG_RESET

Log

AC:L/C:N/I:P/A:N