Alert Aggregation in Mobile Ad-Hoc Networks By Bo Sun, Kui Wu, Udo W. Pooch.

Slides:



Advertisements
Similar presentations
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Advertisements

Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
SecureMR: A Service Integrity Assurance Framework for MapReduce Wei Wei, Juan Du, Ting Yu, Xiaohui Gu North Carolina State University, United States Annual.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Application of Bayesian Network in Computer Networks Raza H. Abedi.
Bandwidth Management Framework for IP based Mobile Ad Hoc Networks Khalid Iqbal ( ) Supervisor: Dr. Rajan Shankaran ITEC810 June 05, 2009.
Using Game Theoretic Approach to Analyze Security Issues In Ad Hoc Networks Term Presentation Name: Li Xiaoqi, Gigi Supervisor: Michael R. Lyu Department:
Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks - IEEE October 2007 CMSC Advanced Computer Networks Oleg Aulov CMSC.
Specification-based Intrusion Detection Michael May CIS-700 Fall 2004.
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Microsoft Ignite /16/2017 4:54 PM
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
An Assessment of Mobile Ad-Hoc Network (MANET) Issues Jerry Usery CS 526 May 12 th, 2008.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
DARPA Security Mini-task Naveen Sastry. Groups Involved BBN SRI UMass / UMich / U. Arizona UC Berkeley.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks Hochoong Cho, Sang-Ho Lee Mobile Telecommunication Research Division, ETRI, KOREA Younghwan.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Secure In-Network Aggregation for Wireless Sensor Networks
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
1 Protecting Network Quality of Service against Denial of Service Attacks Douglas S. Reeves S. Felix Wu Chandru Sargor N. C. State University / MCNC October.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Authors: Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra,
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
SIEM Rotem Mesika System security engineering
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Matt Hornbrook James Beams
Some Issues in MANET, Wireless & Cellular Security/Privacy
Optimal CyberSecurity Analyst Staffing Plan
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Authors Bo Sun, Fei Yu, Kui Wu, Yang Xiao, and Victor C. M. Leung.
Limiting Uncertainty in Intrusion Response
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Presentation transcript:

Alert Aggregation in Mobile Ad-Hoc Networks By Bo Sun, Kui Wu, Udo W. Pooch

Background Manet- Mobile Adhoc NETwork Routing in MANETs is difficult –mobility causes frequent network topology changes –When network nodes move, established paths may break and the routing protocol must dynamically search for other feasible routes Protection of routes from malicious agents is tough!

Proposed technique Protection of routing protocols in MANET’s using –Non-overlapping Zone-Based Intrusion Detection System for MANETs. Alert Aggregation algorithm with provides low false alarms

Threat Model Attacker: 1 Victims: 2,3,4,7,8 Attacker Objective: Falsified RREP {2,4,9,7,1,5,3}

Assumptions Network can be divided into non- overlapping zones Local IDS agent is tamper resistant Attacker uses fake address; but does not change it dynamically

ZBIDS Framework Gateway nodes 4, 7, 8 Intra-zone nodes report to gateway nodes

IDS Agent

Determination of P Determination of P depends on –Attack intensity, Attack time, Node placement If P is low –Gateway nodes can detect attacks=> high false positive Else –Gateway nodes can miss attacks => Low false positive

Determine_p P = h t * p test + h a * P attack Where ht and ha are false positive ratio and detection ratio

Alert Aggregation Alert Aggregation algorithm –Detection sensitivity decreases with the increase in the number of attackers –How about colluted attack’s ?

Performance Metrics False Positive Ratio: percentage of decisions in which normal alert aggregations are flagged as anomalous Detection ratio: number of gateway nodes raising correct alarms divided by total number of gateway nodes which should raise alarms in the anomalous data