e20-4yp-wifi-7-backoff-security-testing-and-threat-prediction

Digital Twins for Security Testing and Threat Prediction for WiFi 7 MLO Operations

Team Members

Supervisors

Table of Contents

  1. Abstract
  2. Related Works
  3. Methodology
  4. Experiment Setup and Implementation
  5. Results and Key Findings
  6. How to Use
  7. Conclusion
  8. Links

Abstract

WiFi 7 (IEEE 802.11be) introduces Multi-Link Operation (MLO) as a cornerstone feature, enabling devices to aggregate bandwidth and switch seamlessly across multiple frequency bands (2.4 GHz, 5 GHz, and 6 GHz). While MLO promises unprecedented speed and reliability, it also introduces significant complexity and a new attack surface. Traditional security testing methods, which rely on physical hardware, are expensive, difficult to scale, and insufficient for modeling the dynamic, multi-link nature of MLO.

This project proposes the development of a Digital Twin (DT) framework to address this challenge. We have created a high-fidelity virtual representation of a WiFi 7 MLO network environment using ns-3. This DT serves a dual purpose: first, as a scalable testbed for simulating novel security threats—specifically backoff manipulation and DoS attacks; second, as a data-generation engine for training Graph Neural Network (GNN) models. These models are designed for real-time threat prediction, identifying anomalous MLO behavior and forecasting potential attacks before they can significantly impact the network.


Our research builds upon three primary domains:

  1. WiFi Security: We review the evolution of WiFi security from WEP to WPA3, investigating existing research on attacks against 802.11ax (WiFi 6) and how they adapt to MLO’s multi-link dependencies.
  2. Digital Twin Technology in Networking: We analyze the application of Digital Twins in complex network systems (5G/6G, IoT), focusing on different DT architectures and data synchronization techniques.
  3. ML for Network Intrusion Detection (NIDS): We explore the use of machine learning for identifying security threats. While traditional research focuses on LSTMs or RNNs, our work specifically leverages Graph Neural Networks (GNNs) to model the complex temporal relationships in network packet flows and link states.

Methodology

Our methodology is divided into two primary stages: Data Generation and Machine Learning Modeling.

Phase 1: DT Framework and MLO Modeling (Data Generation)

We utilize a custom simulation environment built using ns-3 to model a Wi-Fi 7 MLO network.

Phase 2: Anomaly Detection with Graph Neural Networks

The generated data drives a GNN-based anomaly detection model.


Experiment Setup and Implementation

The project is engineered with a clear separation of concerns:


Results and Key Findings

Our experiments have generated a high-quality dataset that exhibits clear, statistically significant differences between normal and attack scenarios.

Quantifiable Impact of Attacks

The analysis reveals that backoff manipulation attacks have a severe and measurable impact on network performance. The most prominent indicators identified by our Digital Twin include:

Model Performance

The GNN model demonstrates high accuracy in distinguishing between normal operations and bias-based attacks, validating the effectiveness of using graph-based learning for time-series network data.


How to Use

  1. Understand the Data: Review 01_Data_Profiling_Report.md and 02_Summary_Statistics.md in the repository to understand the dataset structure.
  2. Train the Model:
    python train_attack.py
    

    Refer to 04_Modeling_Guide.md for environment setup.

  3. Evaluate Performance:
    python eval.py
    

    This assesses the model’s ability to detect attacks on unseen test data.

  4. Extend the Research: Modify the ns-3 scripts in the scratch/ directory to simulate new attack vectors or network topologies.

Conclusion

This project delivers a novel Digital Twin framework specifically designed for securing WiFi 7 MLO operations. By combining detailed ns-3 simulations with advanced Graph Neural Networks, we moved beyond theoretical analysis to provide a practical framework for threat detection. Our work provides a clear pathway for network administrators to proactively identify, test, and mitigate security risks in the next generation of wireless networks.

Future work will focus on expanding the DT’s fidelity to include more advanced 802.11be features (like EMLSR) and exploring Federated Learning.


Publications