Trusted Router and Collaborative Attacks Bharat Bhargava.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Collaborative Attacks on Routing Protocols in Ad hoc Networks Neelima Gupta University of Delhi India.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
On Security Study of Two Distance Vector Routing Protocols for Ad Hoc Networks Weichao Wang, Yi Lu, Bharat Bhargava CERIAS and Department of Computer Sciences.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Centre for Wireless Communications University of Oulu, Finland
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
1 MANETS – An overview. 2 MANETs Model and Definitions Simulatability – mobility models Routing algorithms Security issues with routing algorithms Tracing.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
KAIS T SIGF : A Family of Configurable, Secure Routing Protocols for WSNs Sep. 20, 2007 Presented by Kim, Chano Brian Blum, Tian He, Sang Son, Jack Stankovic.
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Network Raymond Chang March 30, 2005 EECS 600 Advanced Network Research, Spring.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Security and Cooperation in Wireless Networks Georg-August University Göttingen Secure routing in multi-hop wireless networks (I) Secure routing in multi-hop.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Introduction Wireless devices offering IP connectivity
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

Trusted Router and Collaborative Attacks Bharat Bhargava

2 Trusted Router and Protection Against Collaborative Attacks Characterizing collaborative/coordinated attacks Types of collaborative attacks Identifying Malicious activity Identifying Collaborative Attack

3 Collaborative Attacks Informal definition: “Collaborative attacks (CA) occur when more than one attacker or running process synchronize their actions to disturb a target network”

4 Collaborative Attacks (cont’d) Forms of collaborative attacks Multiple attacks occur when a system is disturbed by more than one attacker Attacks in quick sequences is another way to perpetrate CA by launching sequential disruptions in short intervals Attacks may concentrate on a group of nodes or spread to different group of nodes just for confusing the detection/prevention system in place Attacks may be long-lived or short-lived Attacks on routing

5 Collaborative Attacks (cont’d) Open issues Comprehensive understanding of the coordination among attacks and/or the collaboration among various attackers Characterization and Modeling of CAs Intrusion Detection Systems (IDS) capable of correlating CAs Coordinated prevention/defense mechanisms

6 Collaborative Attacks (cont’d) From a low-level technical point of view, attacks can be categorized into: Attacks that may overshadow (cover) each other Attacks that may diminish the effects of others Attacks that interfere with each other Attacks that may expose other attacks Attacks that may be launched in sequence Attacks that may target different areas of the network Attacks that are just below the threshold of detection but persist in large numbers

7 Examples of Attacks that can Collaborate Denial-of-Messages (DoM) attacks Blackhole attacks Wormhole attacks Replication attacks Sybil attacks Rushing attacks Malicious flooding We are investigating the interactions among these forms of attacks Example of probably incompatible attacks: Wormhole attacks need fast connections, but DoM attacks reduce bandwidth!

8 Current Proposed Solutions Blackhole attack detection Reverse Labeling Restriction (RLR) Wormhole Attacks: defense mechanism E2E detector and Cell-based Open Tunnel Avoidance (COTA) Sybil Attack detection Light-weight method based on hierarchical architecture Modeling Collaborative Attacks using Causal Model

9 Blackhole attack detection: Reverse Labeling Restriction (RLR) Every host maintains a blacklist to record suspicious hosts who gave wrong route related information Blacklists are updated after an attack is detected The destination host will broadcast an INVALID packet with its signature when it finds that the system is under attack on sequence. The packet carries the host ’ s identification, current sequence, new sequence, and its own blacklist Every host receiving this packet will examine its route entry to the destination host. The previous host that provides the false route will be added into this host ’ s blacklist

10 RLR (cont’d) During Route Rediscovery, False Destination Sequence Number Attack is Detected, S needs to find D again Node movement breaks the path from S to M (trigger route rediscovery) D SS1 S2 M S3 S4 RREQ(D, 21) (1). S broadcasts a request that carries the old sequence + 1 = 21 (2) D receives the RREQ. Local sequence is 5, but the sequence in RREQ is 21. D detects the false destination sequence number attack. Propagation of RREQ Detecting false destination sequence attack by destination host during route rediscovery

11 RLR (cont’d) Correct destination sequence number is broadcasted. Blacklist at each host in the path is determined D SS1 S2 M S3 S4 BL {} BL {S2} BL {} BL {M} BL {S1} BL {} INVALID ( D, 5, 21, BL{}, Signature ) S4 BL {}

12 RLR (cont’d) Malicious site is in blacklists of multiple destination hosts D4 D1 S3 S1 M D3 S4 S2 D2 [M] M attacks 4 routes (S1-D1, S2-D2, S3-D3, and S4-D4). When the first two false routes are detected, D3 and D4 add M into their blacklists. When later D3 and D4 become victim destinations, they will broadcast their blacklists, and every host will get two votes that M is malicious host

13 Two Attacks in Collaboration: blackhole & replication The RLR scheme cannot detect the two attacks working simultaneously The malicious node M relies on the replicated neighboring nodes to avoid the blacklist D4 D1 S3 S1 M D3 S4 S2 D2 [M] Replicated nodes Regular nodes

Defending against Collaborative Packet Drop Attacks on Router

Packet drop attacks put severe threats to Ad Hoc network performance and safety Directly impact the parameters such as packet delivery ratio Will impact security mechanisms such as distributed node behavior monitoring Different approaches have been proposed Vulnerable to collaborative attacks Have strong assumptions of the nodes Problem Statement

Many research efforts focus on individual attackers The effectiveness of detection methods will be weakened under collaborative attacks E.g., in “watchdog”, multiple malicious nodes can provide fake evidences to support each other’s innocence In wormhole and Sybil attacks, malicious nodes may share keys to hide their real identities Problem Statement

We focus on collaborative packet drop attacks. Why? Secure and robust data delivery is a top priority for many applications The proposed approach can be achieved as a reactive method: reduce overhead during normal operations Can be applied in parallel to secure routing Problem Statement

Detecting packet drop attacks Audit based approaches Whether or not the next hop forward the packets Use both first hand and second hand evidences Problems: Energy consumption of eavesdropping Can be cheated by directional antenna Authenticity of the evidence Incentive based approaches Nuggets and credits Multi-hop acknowledgement Related Work

Collaborative attacks and detection Classification of the collaborative attacks Collusion attack model on secure routing protocols Collaborative attacks on key management in MANET Detection mechanisms: Collaborative IDS systems Ideas from immune systems Byzantine behavior based detection Related Work

REAct system: Proposed by researchers in Arizona, ACM WiSec 2009 Random audit based detector of packet drop A reactive approach: will be activated only when something bad happens Assumptions: At least two node disjoint paths b/w any pair of nodes Know the identity of the intermediate nodes Pair-wise keys b/w the source and the intermediate nodes REAct system and Vulnerability

Working procedure of REAct Destination detects the drop in packet arriving rate and notifies the source Source randomly selects an intermediate node and asks it to generate a behavioral proof of the received packets Intermediate node constructs a bloom filter using these packets Source compares the bloom filter to its own value If match: the attacker is after the intermediate node Otherwise, it is before the intermediate node Repeat the procedure until the bad link is located REAct system and Vulnerability

Example of REAct: the source selects n4 to be the first audited node. n4 generates the correct bloom filter, so the attacker is between n4 and D. REAct system and vulnerability

n1 and n4 are collusive attackers. n1 discards the packets but delivers the bloom filter to n4. Now the source will think that the attacker is between n4 and D. Why REAct is vulnerable to this attack: the source can verify the bloom filter, but not the generator of the filter. Collaborative attacks on REAct

Assumptions: Source shares a different secret key and a different random number with every intermediate node All nodes in the network agree on a hash function h() There are multiple attackers in the network They share their secret keys and random numbers Attackers have their own communication channel An attacker can impersonate other attackers Proposed approach

Hash based approach: Every node will add a fingerprint into the packet S1 sends out the packet to n1: S  n1: (S, D, data packet, random number t0) Node n1 will combine the received packet and its random number r1 to calculate the new fingerprint: t1 = h( r1 || S || D || data packet || t0 || r1 ) n1  n2: (S, D, data packet, t1 ) The audited node will generate the bloom filter based on the data packets and the fingerprints The source will generate its own bloom filter and compare it to the value of the audited node Proposed approach

Why our approach is safe The node behavioral proofs in our proposed approach contain information from both the data packets and the intermediate nodes. Theorem 1. If node ni correctly generates the value ti, then all innocent nodes in the path before ni (including ni) must have correctly received the data packet selected by S. Proposed approach

Why this approach is safe The ordered hash calculations guarantee that any update, insertion, and deletion operations to the sequence of forwarding nodes will be detected. Therefore, we have: if the behavioral proof passes the test of S, the suspicious set will be reduced to {ni, ni+1, ---, D} if the behavioral proof fails the test of S, the suspicious set will be reduced to {S, n1, ---, ni} Proposed approach

Indistinguishable audit packets The malicious node should not tell the difference between the data packets and audited packets The source will attach a random number to every data packet Reducing computation overhead A hash function needs 20 machine cycles to process one byte We can choose a part of the bytes in the packet to generate the fingerprint. In this way, we can balance the overhead and the detection capability. Discussion

Security of the proposed approach The hash function is easy to compute: very hard to conduct DoS attacks on our approach It is hard for attackers to generate fake fingerprint: they have to have a non-negligible advantage in breaking the hash function The attackers will adjust their behavior to avoid detection The source may choose multiple nodes to be audited at the same time The source should adopt a random pattern to determine the audited nodes Discussion

Dealing with Collaborative Attacks Earlier approach is vulnerable to collaborative attacks Propose a new mechanism for nodes to generate behavioral proofs Hash based packet commitment Contain both contents of the packets and information of the forwarding paths Introduce limited computation and communication overhead Extensions: Investigate other collaborative attacks Integrate our detection method with secure routing protocols