Malware |
Infection |
|
|
|
|
|
Hybrid lightweight IDS |
Control access, system integrity solutions and multi-factor authentication |
BackDoor Access |
Infection |
|
|
|
|
|
Hybrid lightweight IDS, vulnerability assessment |
Multi-factor robust authentication scheme |
Social Engineering |
Exploitation |
|
|
X |
X |
|
Raising awareness, training operators |
N/A |
Baiting |
Exploitation |
|
|
|
X |
|
Raising awareness, training operators |
N/A |
Injection/Modification |
Exploitation |
|
X |
|
X |
X |
Machine-Learning hybrid IDS, time stamps |
Message authentication or digital signature |
Fabrication |
Exploitation |
|
X |
|
X |
|
, Assigning privilege |
Multi-factor authentication, message authentication or digital signature |
Reconnaissance |
Information gathering |
|
|
X |
X |
X |
Hybrid lightweight IDS |
Encrypted traffic/stream |
Scanning |
Information gathering |
|
|
|
X |
X |
Hybrid lightweight IDS or Honeypot |
Encrypted traffic/stream |
Three-Way Handshake |
Interception |
X |
X |
X |
|
|
Traffic filtering, close unused TCP/FTP ports |
X |
Eavesdropping |
Interception |
|
|
X |
X |
X |
N/A |
Securing communication/traffic, secure connection |
Traffic Analysis |
Interception |
|
X |
X |
X |
X |
N/A |
Securing communication/traffic, secure connection |
Man-in-the-Middle |
Authentication |
|
|
|
X |
X |
Lightweight hybrid IDS |
Multi-factor authentication & lightweight strong cryptographic authentication protocol |
Password Breaking |
Cracking |
X |
X |
X |
X |
|
Lightweight IDS |
Strong periodic passwords, strong encryption |
Wi-Fi Aircrack |
Cracking |
X |
X |
X |
X |
|
Lightweight IDS at the physical layer |
Strong & periodic passwords, strong encryption algorithm |
Wi-Fi Jamming |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, frequency range variation |
N/A |
De-Authentication |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, frequency range variation |
N/A |
Replay |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, time stamps |
N/A |
Buffer Overflow |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, frequency range variation |
N/A |
Denial of Service |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, frequency range variation |
N/A |
ARP Cache Poison |
Jamming |
X |
X |
X |
X |
|
Frequency hopping, frequency range variation |
N/A |
Ping-of-Death |
Jamming |
X |
X |
X |
X |
|
Frequency range variation |
N/A |
GPS Spoofing |
Jamming |
X |
X |
X |
X |
|
Return-to-base, frequency range variation |
N/A |