Table 3.
Summary of 17 types of adversarial attacks.
| Attack Scope | Category count | Attack type | Attack stage | Attack code |
|---|---|---|---|---|
| Physical layer attacks (A) | 3 | Wavelength eavesdropping15 | Single-point | A1 |
| Optical path hijacking | Multi-stage | A2 | ||
| Cross-domain privilege escalation | Multi-stage | A3 | ||
| Data layer attacks (B) | 3 | Data tampering16 | Single-point | B1 |
| Man-in-the-middle attack | Multi-stage | B2 | ||
| Data leakage | Single-point | B3 | ||
| Logical layer attacks (C) | 3 | Web penetration attack | Multi-stage | C1 |
| APT (advanced persistent threat) attack | Multi-stage | C2 | ||
| SQL (structured query language) injection | Single-point | C3 | ||
| Service layer attacks (D) | 3 | DoS (denial of service)18 | Single-point | D1 |
| Botnet | Multi-stage | D2 | ||
| Service spoofing | Multi-stage | D3 | ||
| Application layer attacks (E) | 2 | DDoS | Single-point | E1 |
| Brute force attack | Single-point | E2 | ||
| Advanced composite attacks (F) | 3 | Route hijacking | Multi-stage | F1 |
| Resource exhaustion attack | Single-point | F2 | ||
| Protocol vulnerability exploitation18 | Multi-stage | F3 |