Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC 681 - Advanced Computer Networks Oleg Aulov CMSC.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Secure Wireless Ad Hoc Routing
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Specification-based Intrusion Detection Michael May CIS-700 Fall 2004.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Intrusion Detection Techniques for Mobile Wireless Networks Authors: Yongguang Zhang, HRL Laboratories LLC, Malibu, California. Wenke Lee, College of Computing,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Intrusion Detection in Wireless Sensor Networks Group Meeting Spring 2005 Presented by Edith Ngai.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Mark W. Propst Scientific Research Corporation.  Attack Motivations  Vulnerability Classification  Traffic Pattern Analysis  Testing Barriers  Concluding.
Network-layer Security of Mobile Ad hoc Networks Jiangyi Hu Advisor: Dr. Mike Burmester.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Trust Mechanisms in Ad Hoc Networks Azar Rahimi Dehaghani Lei Hu Trust and Security Case Study 2.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Alert Aggregation in Mobile Ad-Hoc Networks By Bo Sun, Kui Wu, Udo W. Pooch.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Secure In-Network Aggregation for Wireless Sensor Networks
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Scalable Routing Protocols for
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Sensor Network Routing
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
by Saltanat Mashirova & Afshin Mahini
Adhoc and Wireless Sensor Networks
Proactive vs. Reactive Routing
ITIS 6010/8010 Wireless Network Security
Cross-layer Analysis for detecting Wireless Misbehavior
Computer Networks: Wireless Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Vehicular Ad Hoc Network Intrusion Detection System Based on BUSNets
Presentation transcript:

Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC Advanced Computer Networks Oleg Aulov

MANET and WSN  No wires, Limited battery life, Limited memory and processing capability  No base stations, Mobile nodes, Nodes relay data (act as routers)  Usually no centralized authority  Deployed in adverse or hostile environment  Prevention sec.-key distrib. Mgmt. schemes - doesn’t work once the node is compromised and the secrets leak. Insiders can cause greater damage.  No wires, Limited battery life, Limited memory and processing capability  No base stations, Mobile nodes, Nodes relay data (act as routers)  Usually no centralized authority  Deployed in adverse or hostile environment  Prevention sec.-key distrib. Mgmt. schemes - doesn’t work once the node is compromised and the secrets leak. Insiders can cause greater damage.

IDS-second line of defence  IDS - dynamically monitors the system to detect compromise of confidentiality, availability and integrity.  Two common types -  misuse based - stores database of known attacks  anomaly based - creates normal profile of system states or user behaviors (difficult to built, mobility challenges)  Specification based - manually developed specs, time-consuming  IDS - dynamically monitors the system to detect compromise of confidentiality, availability and integrity.  Two common types -  misuse based - stores database of known attacks  anomaly based - creates normal profile of system states or user behaviors (difficult to built, mobility challenges)  Specification based - manually developed specs, time-consuming

ID in MANET - attacks  Routing logic compromise - blackhole, routing update storm, fabrication,  Traffic Distortion - dropping, coruption, flooding  Others - rushing, wormhole, spoofing  Routing logic compromise - blackhole, routing update storm, fabrication,  Traffic Distortion - dropping, coruption, flooding  Others - rushing, wormhole, spoofing

MANET - Existing Research- Zhang et al  Agent attached to each node, performs ID & response individually  Unsupervised method to construct & select feature set (dist, velocity, # hops, etc)  Pattern classification problem - apply RIPPER(decision tree for rule induction) & SVM Light (support vector machine, when data cannot be classified by set of features) algorithms  Post Processing - to eliminate false alarms  Agent attached to each node, performs ID & response individually  Unsupervised method to construct & select feature set (dist, velocity, # hops, etc)  Pattern classification problem - apply RIPPER(decision tree for rule induction) & SVM Light (support vector machine, when data cannot be classified by set of features) algorithms  Post Processing - to eliminate false alarms

MANET - Existing Research Huang et al  Cross-Feature Analysis-learning based method to capture correlation patterns.  L featires - f1,f2,…,fL  fi - feature characterizing topology or route activities  Solve classification problem -  Create Set Ci:{f1,…,fi-1,fi+1,…,fL}, used to identify temporal correlation between one feature and all the other features.  Ci - very likely to predict in normal circumstances, very unlikely during attack  Cross-Feature Analysis-learning based method to capture correlation patterns.  L featires - f1,f2,…,fL  fi - feature characterizing topology or route activities  Solve classification problem -  Create Set Ci:{f1,…,fi-1,fi+1,…,fL}, used to identify temporal correlation between one feature and all the other features.  Ci - very likely to predict in normal circumstances, very unlikely during attack

MANET - Existing Research Huang and Lee  Collaboration with neighbors - broader ID range - more accurate, more information bout attacks  Cluster based detection scheme - FSM - Initial, Clique, Done, Lost Ad hoc On Demand Distance Vector (AODV) algorithm  EFSA - detect state and transition violations  Specification based approach, detects abnormal patterns and anomalous basic events.  Collaboration with neighbors - broader ID range - more accurate, more information bout attacks  Cluster based detection scheme - FSM - Initial, Clique, Done, Lost Ad hoc On Demand Distance Vector (AODV) algorithm  EFSA - detect state and transition violations  Specification based approach, detects abnormal patterns and anomalous basic events.

MANET - Existing Research Marti et al  Watchdog and Pathrater to identify and respond to routing misbehaviors.  Each node verifies that his data was forwarded correctly. DSR - dynamic source routing  Rate routes and use more reliable ones.  Watchdog and Pathrater to identify and respond to routing misbehaviors.  Each node verifies that his data was forwarded correctly. DSR - dynamic source routing  Rate routes and use more reliable ones.

MANET - Existing Research Tseng et al  Based on AODV - specification based ID  Detects run time violations  FSM - specify behaviors of AODV  Maintain RREP and RREQ messages  Based on AODV - specification based ID  Detects run time violations  FSM - specify behaviors of AODV  Maintain RREP and RREQ messages

MANET - Existing Research Sun et al  Use Markov Chains to characterize normal behaviors  Motivated by ZBIDS (zone based) - locally generated alerts inside the zone  Gateway Nodes - broadcast alerts within the zone  IDMEF (message exchange format) - presented to facilitate interoperability of IDS agents.  Use Markov Chains to characterize normal behaviors  Motivated by ZBIDS (zone based) - locally generated alerts inside the zone  Gateway Nodes - broadcast alerts within the zone  IDMEF (message exchange format) - presented to facilitate interoperability of IDS agents.

ID in WSN

Secure Localization  GPS not feasible  Utilization of beacon packets and beacon nodes  Du et al - utilize deployment knowledge to confirm beacon integrity  Liu et al - filter out malicious location references using  Mean square error  Compute inconsistency  Voting based location estimation  GPS not feasible  Utilization of beacon packets and beacon nodes  Du et al - utilize deployment knowledge to confirm beacon integrity  Liu et al - filter out malicious location references using  Mean square error  Compute inconsistency  Voting based location estimation

Secure Aggregation  Wagner - robust statistics for resilient aggregation, truncation, trimming  Yang - Secure Hop by Hop Aggregation Protocol (SDAP)  Divide and conquer  Commit and attest  Grubbs’ test Buttyan - RANSAC paradigm for resilient aggregation. maximum likehood estimation  Wagner - robust statistics for resilient aggregation, truncation, trimming  Yang - Secure Hop by Hop Aggregation Protocol (SDAP)  Divide and conquer  Commit and attest  Grubbs’ test Buttyan - RANSAC paradigm for resilient aggregation. maximum likehood estimation

Future Research Directions  Extended Kalman Filter Based Aggregation - light weight solution for estimation of neighbor monitoring features  Integration of Mobility and ID in MANET - consideration to use link change rate as an indication of mobility.  Collaboration of IDM and SMM (sys. Mon.) - to address a problem of detecting abnormal event vs. false alarm. - ask the surrounding nodes to confirm  Extended Kalman Filter Based Aggregation - light weight solution for estimation of neighbor monitoring features  Integration of Mobility and ID in MANET - consideration to use link change rate as an indication of mobility.  Collaboration of IDM and SMM (sys. Mon.) - to address a problem of detecting abnormal event vs. false alarm. - ask the surrounding nodes to confirm

Questions ???