Experts from the National Research University “MIET” have developed a highly effective system for detecting cyberattacks in Wi-Fi wireless networks. Thanks to its unique architecture, this system makes it significantly harder for hackers to remain hidden. The research details have been published in the International Journal of Open Information Technologies.
MIET University highlighted that cyberattacks pose a threat not only to users` finances and personal data. They can also be aimed at destabilizing the operations of critical infrastructure facilities, such as airports, manufacturing plants, and logistics centers.
Dmitry Burenok, a postgraduate student at MIET University`s Information Security Department, explained the system`s principle using an analogy: “Imagine you are fishing in a large lake. To increase your catch, you could use several fishing rods, which is reliable but costly. Perhaps it would be more effective not to increase the number of rods, but to add more hooks to each one.”
Guided by this metaphor, MIET University researchers developed a new system to protect internet networks from unauthorized access. In this analogy, the “lake” represents the radio spectrum, the “fishing rods” are the sensors designed to detect Wi-Fi network attacks, and the “hooks” are the network interfaces of these sensors. A distinctive feature of the developed devices is their ability to work cooperatively and their easy integration into existing network infrastructures without significant financial investment, the expert noted.
Burenok also pointed out additional application areas for this system. “Consider a scenario of unfair competition where one company deliberately disrupts another`s Wi-Fi connection. In such cases, a tool for collecting irrefutable evidence is crucial, enabling the aggrieved party to involve law enforcement to protect its interests. Furthermore, many industrial systems actively use Wi-Fi technology, and for these systems, attack monitoring is not merely a security measure but also a legally mandated requirement,” he explained.
Burenok added that the latest version of the developed sensors includes a function for precisely locating the attacker`s device. The system`s modular architecture provides flexibility for further expanding its capabilities.
