The Community for Technology Leaders
RSS Icon
pp: 1
Angela Dalton , The Johns Hopkins University, Laurel
Cherita Corbett , The Johns Hopkins University, Laurel
Jason Uher , The Johns Hopkins University, Laurel
Jarriel Cook , The Johns Hopkins University, Laurel
We create a moving-target in the network protocol stack, specifically focused on mitigating intelligent jamming (IJ). IJ goes beyond applying brute-force power at the physical link and instead exploits vulnerabilities specific to protocols. An IJ-equipped attacker that can gain a foothold into a network by exploiting vulnerabilities can operate with a lower chance of detection and a highly targeted impact on the network. We introduce protocol agility at multiple layers of the stack to inhibit protocol driven attacks. Our prototype counter-intelligent jamming (CIJ) system leverages software-defined radio (SDR) and software-defined networking (SDN) technologies. SDRs implement communication algorithms in software as close to the RF signal as possible. SDRs are used for modulation and coding at the physical and data link layers. SDN provides an interface and abstractions allowing software definition of network forwarding behavior. We use the SDR/SDN combination to apply a variety of moving-target defenses across the network stack.
Angela Dalton, Cherita Corbett, Jason Uher, Jarriel Cook, "Countering Intelligent Jamming with Full Protocol Stack Agility", IEEE Security & Privacy, , no. 1, pp. 1, PrePrints PrePrints, doi:10.1109/MSP.2013.136
52 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool