Cargando…

Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains

Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill...

Descripción completa

Detalles Bibliográficos
Autores principales: Zanna, Paul, Radcliffe, Peter, Kumar, Dinesh
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738866/
https://www.ncbi.nlm.nih.gov/pubmed/36502182
http://dx.doi.org/10.3390/s22239481
_version_ 1784847656601780224
author Zanna, Paul
Radcliffe, Peter
Kumar, Dinesh
author_facet Zanna, Paul
Radcliffe, Peter
Kumar, Dinesh
author_sort Zanna, Paul
collection PubMed
description Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks.
format Online
Article
Text
id pubmed-9738866
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97388662022-12-11 Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains Zanna, Paul Radcliffe, Peter Kumar, Dinesh Sensors (Basel) Article Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks. MDPI 2022-12-04 /pmc/articles/PMC9738866/ /pubmed/36502182 http://dx.doi.org/10.3390/s22239481 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zanna, Paul
Radcliffe, Peter
Kumar, Dinesh
Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title_full Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title_fullStr Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title_full_unstemmed Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title_short Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
title_sort preventing attacks on wireless networks using sdn controlled ooda loops and cyber kill chains
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738866/
https://www.ncbi.nlm.nih.gov/pubmed/36502182
http://dx.doi.org/10.3390/s22239481
work_keys_str_mv AT zannapaul preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains
AT radcliffepeter preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains
AT kumardinesh preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains