Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains

被引:5
|
作者
Zanna, Paul [1 ]
Radcliffe, Peter [1 ]
Kumar, Dinesh [1 ]
机构
[1] RMIT Univ, Sch Elect & Elect Engn, Melbourne, Vic 3000, Australia
关键词
IEEE; 802; 11; wifi; denial-of-service; security; software defined networking; P4;
D O I
10.3390/s22239481
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Anomaly detection in cyber security attacks on networks using MLP deep learning
    Teoh, T. T.
    Chiew, Graeme
    Franco, Edwin J.
    Ng, P. C.
    Benjamin, M. P.
    Goh, Y. J.
    [J]. 2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [42] An Ensemble-Based Machine Learning Approach for Cyber-Attacks Detection in Wireless Sensor Networks
    Ismail, Shereen
    El Mrabet, Zakaria
    Reza, Hassan
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [43] Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV
    Luo, Shibo
    Wang, Hongkai
    Wu, Jun
    Li, Jianhua
    Guo, Longhua
    Pei, Bei
    [J]. 2016 IEEE 83RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2016,
  • [44] Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks
    Liu, Xiang
    Lim, Teng Joon
    Huang, Jie
    [J]. AD HOC NETWORKS, 2020, 99
  • [45] Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks
    Liu X.
    Lim T.J.
    Huang J.
    [J]. Ad Hoc Netw., 2020,
  • [46] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    [J]. COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [47] Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information
    Znaidi, Wassim
    Minier, Marine
    Babau, Jean-Philippe
    [J]. 2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 990 - 994
  • [48] Identifying localization attacks in wireless sensor networks using deep learning
    Wang, Hua
    Wen, Yingyou
    Zhao, Dazhe
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (02) : 1339 - 1351
  • [49] Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks
    Al-issa, Abdulaziz, I
    Al-Akhras, Mousa
    ALsahli, Mohammed S.
    Alawairdhi, Mohammed
    [J]. 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 107 - 112
  • [50] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    [J]. 2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +