Cargando…
Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains
Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738866/ https://www.ncbi.nlm.nih.gov/pubmed/36502182 http://dx.doi.org/10.3390/s22239481 |
_version_ | 1784847656601780224 |
---|---|
author | Zanna, Paul Radcliffe, Peter Kumar, Dinesh |
author_facet | Zanna, Paul Radcliffe, Peter Kumar, Dinesh |
author_sort | Zanna, Paul |
collection | PubMed |
description | Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks. |
format | Online Article Text |
id | pubmed-9738866 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-97388662022-12-11 Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains Zanna, Paul Radcliffe, Peter Kumar, Dinesh Sensors (Basel) Article Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe-Orientate-Decide-Act (OODA) loop and Cyber Kill Chain (CKC) strategies to detect and neutralize these attacks. To evaluate this approach, we conducted experiments using four attack methods on a wireless router equivalent device, five wireless client devices, and two attack devices. The system employs a Radio Frequency (RF) device identification system and attack state machine implemented using a Software Defined Networking (SDN) architecture and the P4 programming language. The technique remains compliant with the IEEE 802.11 standard and requires no client-side modifications. The results show that the RF section detected 97.5% (average) of impersonated frames, and the overall method neutralized all attacks in the four attack scenarios. This outcome demonstrates that this technique, built on the OODA loops and CKC methodology, using SDN architecture and P4, is suitable for real-time detection and prevention of wireless impersonation attacks. MDPI 2022-12-04 /pmc/articles/PMC9738866/ /pubmed/36502182 http://dx.doi.org/10.3390/s22239481 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zanna, Paul Radcliffe, Peter Kumar, Dinesh Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title | Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title_full | Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title_fullStr | Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title_full_unstemmed | Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title_short | Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains |
title_sort | preventing attacks on wireless networks using sdn controlled ooda loops and cyber kill chains |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9738866/ https://www.ncbi.nlm.nih.gov/pubmed/36502182 http://dx.doi.org/10.3390/s22239481 |
work_keys_str_mv | AT zannapaul preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains AT radcliffepeter preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains AT kumardinesh preventingattacksonwirelessnetworksusingsdncontrolledoodaloopsandcyberkillchains |