DocumentCode :
106357
Title :
Countering Intelligent Jamming with Full Protocol Stack Agility
Author :
Corbett, Cherita ; Uher, Jason ; Cook, Jonathan ; Dalton, A.
Volume :
12
Issue :
2
fYear :
2014
fDate :
Mar.-Apr. 2014
Firstpage :
44
Lastpage :
50
Abstract :
Intelligent jamming (IJ) attacks go beyond applying brute-force power at the physical link, exploiting vulnerabilities specific to protocols or configurations. IJ attackers who can gain a foothold into a network by understanding and exploiting vulnerabilities can operate with a much lower chance of detection and a greater impact on the network. For example, one IJ technique exploits media access control (MAC) layer packet structure to selectively jam packets originating from or destined to a specific user. This project aims to create a moving target in the network protocol stack to mitigate IJ attacks. It introduces protocol agility at all layers of the stack to make such protocol-driven attacks infeasible.
Keywords :
access protocols; computer network security; jamming; IJ attacks; IJ technique; MAC layer packet structure; brute-force power; intelligent jamming; media access control layer packet structure; network protocol stack; physical link; protocol agility; protocol stack agility; protocol-driven attacks; Computer crime; Computer security; Jamming; Protocols; Software architecture; Target tracking; Wireless communication; MTD; SDN; SDR; intelligent jamming; moving-target defense; security; software-defined networking; software-defined radio;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.136
Filename :
6673503
Link To Document :
بازگشت