Countering Intelligent Jamming with Full Protocol Stack Agility

作者: Cherita Corbett , Jason Uher , Jarriel Cook , Angela Dalton

DOI: 10.1109/MSP.2013.136

关键词: Media access controlSoftware-defined networkingJammingComputer networkNetwork securityProtocol stackNetwork packetProtocol (object-oriented programming)Computer scienceWireless

摘要: Intelligent jamming (IJ) attacks go beyond applying brute-force power at the physical link, exploiting vulnerabilities specific to protocols or configurations. IJ attackers who can gain a foothold into network by understanding and operate with much lower chance of detection greater impact on network. For example, one technique exploits media access control (MAC) layer packet structure selectively jam packets originating from destined user. This project aims create moving target in protocol stack mitigate attacks. It introduces agility all layers make such protocol-driven infeasible.

参考文章(7)
Mithun Acharya, David J. Thuente, Intelligent jamming in wireless networks with applications to 802.11b and other networks military communications conference. pp. 1075- 1081 ,(2006)
Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan, Openflow random host mutation: transparent moving target defense using software defined networking acm special interest group on data communication. pp. 127- 132 ,(2012) , 10.1145/2342441.2342467
Loukas Lazos, Marwan Krunz, Selective jamming/dropping insider attacks in wireless mesh networks IEEE Network. ,vol. 25, pp. 30- 34 ,(2011) , 10.1109/MNET.2011.5687950
Ketan Mandke, Robert C. Daniels, Soon-Hyeok Choi, Scott M. Nettles, Robert W. Heath, A MIMO demonstration of Hydra Proceedings of the the second ACM international workshop on Wireless network testbeds, experimental evaluation and characterization - WinTECH '07. pp. 101- 102 ,(2007) , 10.1145/1287767.1287790
X. Liu, G. Noubir, R. Sundaram, S. Tan, SPREAD: Foiling Smart Jammers Using Multi-Layer Agility ieee international conference computer and communications. pp. 2536- 2540 ,(2007) , 10.1109/INFCOM.2007.316
Sushil Jajodia, X. Sean Wang, Cliff Wang, Vipin Swarup, Anup K. Ghosh, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats Springer Publishing Company, Incorporated. ,(2011)