• DocumentCode
    106357
  • Title

    Countering Intelligent Jamming with Full Protocol Stack Agility

  • Author

    Corbett, Cherita ; Uher, Jason ; Cook, Jonathan ; Dalton, A.

  • Volume
    12
  • Issue
    2
  • fYear
    2014
  • fDate
    Mar.-Apr. 2014
  • Firstpage
    44
  • Lastpage
    50
  • Abstract
    Intelligent jamming (IJ) attacks go beyond applying brute-force power at the physical link, exploiting vulnerabilities specific to protocols or configurations. IJ attackers who can gain a foothold into a network by understanding and exploiting vulnerabilities can operate with a much lower chance of detection and a greater impact on the network. For example, one IJ technique exploits media access control (MAC) layer packet structure to selectively jam packets originating from or destined to a specific user. This project aims to create a moving target in the network protocol stack to mitigate IJ attacks. It introduces protocol agility at all layers of the stack to make such protocol-driven attacks infeasible.
  • Keywords
    access protocols; computer network security; jamming; IJ attacks; IJ technique; MAC layer packet structure; brute-force power; intelligent jamming; media access control layer packet structure; network protocol stack; physical link; protocol agility; protocol stack agility; protocol-driven attacks; Computer crime; Computer security; Jamming; Protocols; Software architecture; Target tracking; Wireless communication; MTD; SDN; SDR; intelligent jamming; moving-target defense; security; software-defined networking; software-defined radio;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2013.136
  • Filename
    6673503