Skip to main content
. 2025 Aug 11;15:29358. doi: 10.1038/s41598-025-15225-z

Table 3.

Summary of 17 types of adversarial attacks.

Attack Scope Category count Attack type Attack stage Attack code
Physical layer attacks (A) 3 Wavelength eavesdropping15 Single-point A1
Optical path hijacking Multi-stage A2
Cross-domain privilege escalation Multi-stage A3
Data layer attacks (B) 3 Data tampering16 Single-point B1
Man-in-the-middle attack Multi-stage B2
Data leakage Single-point B3
Logical layer attacks (C) 3 Web penetration attack Multi-stage C1
APT (advanced persistent threat) attack Multi-stage C2
SQL (structured query language) injection Single-point C3
Service layer attacks (D) 3 DoS (denial of service)18 Single-point D1
Botnet Multi-stage D2
Service spoofing Multi-stage D3
Application layer attacks (E) 2 DDoS Single-point E1
Brute force attack Single-point E2
Advanced composite attacks (F) 3 Route hijacking Multi-stage F1
Resource exhaustion attack Single-point F2
Protocol vulnerability exploitation18 Multi-stage F3