DocumentCode
106357
Title
Countering Intelligent Jamming with Full Protocol Stack Agility
Author
Corbett, Cherita ; Uher, Jason ; Cook, Jonathan ; Dalton, A.
Volume
12
Issue
2
fYear
2014
fDate
Mar.-Apr. 2014
Firstpage
44
Lastpage
50
Abstract
Intelligent jamming (IJ) attacks go beyond applying brute-force power at the physical link, exploiting vulnerabilities specific to protocols or configurations. IJ attackers who can gain a foothold into a network by understanding and exploiting vulnerabilities can operate with a much lower chance of detection and a greater impact on the network. For example, one IJ technique exploits media access control (MAC) layer packet structure to selectively jam packets originating from or destined to a specific user. This project aims to create a moving target in the network protocol stack to mitigate IJ attacks. It introduces protocol agility at all layers of the stack to make such protocol-driven attacks infeasible.
Keywords
access protocols; computer network security; jamming; IJ attacks; IJ technique; MAC layer packet structure; brute-force power; intelligent jamming; media access control layer packet structure; network protocol stack; physical link; protocol agility; protocol stack agility; protocol-driven attacks; Computer crime; Computer security; Jamming; Protocols; Software architecture; Target tracking; Wireless communication; MTD; SDN; SDR; intelligent jamming; moving-target defense; security; software-defined networking; software-defined radio;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2013.136
Filename
6673503
Link To Document