Presentation is loading. Please wait.

Presentation is loading. Please wait.

Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang.

Similar presentations


Presentation on theme: "Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang."— Presentation transcript:

1 Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang

2 Outline Problem Description Mathematical Formulation 2010/12/16 2 NTU OPLab

3 Problem Description

4 Problem ▫ Topology information gathering ▫ Jamming attack Environment ▫ Infrastructure/Backbone WMNs Role ▫ Attacker ▫ Defender(Service provider) 2010/12/16 4 NTU OPLab

5 Defender Attributes ▫ Nodes  Base Station  Mesh router(with 2 NICs)  Mesh client  Honeynode(with 3 NICs)  Locator  Static  Mobile 2010/12/16 5 NTU OPLab

6 Defender(cont’) Attributes ▫ Budget  Planning phase  Topology planning  Non-deception based ▫ General defense resource ▫ Detection resource ▫ Localization resource  Deception based  Defending phase  Jamming mitigation  Localization ▫ Approximate ▫ Precise 2010/12/16 6 NTU OPLab

7 Defender(cont’) Strategies ▫ Planning phase  Deterrence  Deception ▫ Goal  Protect BS  Protect Nodes with high population  Protect with high traffic  Protect valuable information(ex. routing table, traffic) 2010/12/16 7 NTU OPLab

8 Defender(cont’) Strategies ▫ Defending phase  Population re-allocation  Average population  Average traffic  Priority of jammer removing  Importance oriented  Difficulty oriented 2010/12/16 8 NTU OPLab

9 Attacker Attributes ▫ Budget  Preparing phase  Node compromising  Jammer choosing ▫ High quality jammers ▫ Normal jammers ▫ Capability  Capability of compromising nodes  Capability of recognizing fake info. 2010/12/16 9 NTU OPLab

10 Attacker(cont’) Strategies ▫ Preparing phase  Node compromising  Be aggressive  Least resistance  Be stealthy  Easiest to find  Topology extending  Random 2010/12/16 10 NTU OPLab

11 Attacker(cont’) Strategies ▫ Preparing phase(cont’)  Jammer selection  Maximize attack effectiveness  Maximize jammed range 2010/12/16 11 NTU OPLab

12 Attacker(cont’) Strategies ▫ Attacking phase  Maximize jammed users  Maximize affected traffic 2010/12/16 12 NTU OPLab

13 Scenario 2010/12/16 13 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource

14 Scenario(cont’) For attacker ▫ Objective:  Service disruption ▫ Incomplete information of the network ▫ Budget limited For defender ▫ Objective:  Maintain the quality of service ▫ Budget limited 2010/12/16 14 NTU OPLab

15 Scenario – Network Architecture 2010/12/16 15 NTU OPLab Base Station Mesh router

16 I must protect Core Nodes Scenario – Defender’s Planning Phase 2010/12/16 16 NTU OPLab BS Node with high population Base Station Mesh router

17 Scenario – Defender’s Planning Phase(cont’) 2010/12/16 17 NTU OPLab Base Station Mesh router Honeynode Attacker Nodes with more defense resource I must protect Core Nodes A B C D E F G Why didn’t the defender protect all the nodes with high population? 1.Budget limited. 2.The effectiveness of doing so may not be the best. 3.There are other ways to deploy resources.

18 Scenario – Defender’s Planning Phase(cont’) 2010/12/16 18 NTU OPLab Base Station Mesh router Honeynode Attacker Nodes with more defense resource I must protect Core Nodes Effect of the defense resource may be: 1.Reduce the probability of being compromised

19 Scenario – Defender’s Planning Phase(cont’) 2010/12/16 19 NTU OPLab Base Station Mesh router Honeynode Attacker Nodes with more defense resource I must protect Core Nodes Effect of the defense resource may be: 2.Prevent the attacker from getting closer to the important nodes.

20 Scenario – Defender’s Planning Phase(cont’) 2010/12/16 20 NTU OPLab Base Station Mesh router Honeynode Attacker Nodes with more defense resource I must protect Core Nodes Effect of the defense resource may be: 3.Attract attacks to prevent it from getting close to the important nodes.

21 Scenario – Defender’s Planning Phase(cont’) 2010/12/16 21 NTU OPLab Base Station Mesh router Honeynode Attacker Nodes with more defense resource I must protect Core Nodes A B C D E F G Effect of the defense resource may be: 4.Avoid attacks to prevent it from getting close to the important nodes.

22 Scenario – Attacker’s Preparing Phase 2010/12/16 22 NTU OPLab Signal Strength 20 902090 Initially, the attacker has following info: 1.Number of channels. 2.Signal power of each channel. 3.Traffic amount of each channel. 4.Defense strength of each mesh node. 20 90 A B C D E F G

23 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 23 NTU OPLab Signal Strength 20 902090 The honeynode: If the real channel is compromised, the attacker will be able to identify this target in attacking phase 20 90 A B C D E F G

24 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 24 NTU OPLab Signal Strength 90 20 The attacker’s strategies: Maximize attack effectiveness. Maximize jammed users The initial node will be.. The node with the strongest signal power 90 A B C 20 D E F G

25 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 25 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Attacker Nodes with more defense resource A B C D E F G H I J K L

26 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 26 NTU OPLab Signal Strength After compromise a mesh router, the attacker has following info: 1.Number of channels. 2.Signal power of each channel. 3.Traffic amount of each channel. 4.Defense strength of each mesh node. And… 90 209020 9020 90 20 G L B I D E A H K F J Being compromised, and obtained: 1.routing table info 2.Location info of the mesh router. 3.Traffic info 4.Number of users

27 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 27 NTU OPLab Signal Strength After compromise a mesh router, the attacker has following info: 1.Number of channels. 2.Signal power of each channel. 3.Traffic amount of each channel. 4.Defense strength of each mesh node. 5.Number of traffic sources 90 21 20 35 90 31 20 35 20 28 90 28 20 6 Number of users 90 95 90 21 90 88 20 G L B I D E A H K F J

28 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 28 NTU OPLab Signal Strength The attacker selects next hop with obtained info from compromised mesh routers if available. The node with the highest number of traffic sources 20 6 G 90 21 L 90 95 B I 20 D 28 E 90 21 A 90 28 H 90 31 K 20 35 F 20 35 J 90 88

29 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 29 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Attacker Nodes with more defense resource The action of compromising a honeynode will has following results: 1.Succeed Aware of the fact that it’s a honeynode. Not aware of 2.Failed A B C D E F G HI J K L M N

30 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 30 NTU OPLab Signal Strength The attacker selects next hop with obtained info from compromised mesh routers if available. 90 30 B 90 21 A 20 6 G 90 112 C 20 28 E 20 90 D 27 K 90 24 L 90 25 M 90 18 N

31 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 31 NTU OPLab Signal Strength 90 30 B 90 21 A 20 6 G 28 E 90 27 K 90 24 L 90 25 M 90 18 N However, the node which was compromised by attacker was a honeynode. Thus, it obtained following fake info: 1.Population 2.Traffic of the neighbors The defender will lead the attacker to: 1.Unimportant area 2.Nodes with greater defense strength. 90 112 C 20 90 D

32 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 32 NTU OPLab Signal Strength 90 30 B 90 21 A 20 6 G 28 E 90 27 K 90 24 L 90 25 M 90 18 N Relatively low traffic sources on important nodes. High traffic sources on unimportant nodes. 90 112 C 20 90 D Select node C as next hop

33 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 33 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Attacker Nodes with more defense resource A B C D E F G HI J K L M N Failed to compromise

34 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 34 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Attacker Nodes with more defense resource Compromised 2 nd choice node D A B C D E F G HI J K L M N O PQ R

35 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 35 NTU OPLab Signal Strength 90 30 B 90 21 A 20 6 G 28 E 20 29 O 20 22 R 90 98 Q 90 32 C 20 8 D 90 35 P Select node N as next hop. But what will the attacker do if he compromised a honeynode? When the attacker compromised a honeynode, he may obtain: 1.Only fake info 2.Mixture of fake and true info. What should I do ? Just ignore it? Or attack the node they try to protect? Attackers with high capacity have greater probability to distinguish between true and fake.

36 Scenario – Attacker’s Preparing Phase – Attack Detection 2010/12/16 36 NTU OPLab Signal Strength 90 30 B 90 21 A 20 6 G 28 E 20 29 O 20 22 R 90 98 Q 90 32 C 20 8 D 90 35 P Being attacked? What should I do to protect QoS? Capable of attack detection

37 Scenario – Attacker’s Preparing Phase – Attack Detection(cont’) 2010/12/16 37 NTU OPLab Signal Strength 90 30 B 90 21 A 20 6 G 28 E 20 29 O 20 22 R 90 98 Q 90 32 C 20 8 D 90 35 P Re-allocate the population on its neighbors. Capable of attack detection

38 Scenario – Attacker’s Preparing Phase – Attack Detection(cont’) 2010/12/16 38 NTU OPLab Signal Strength 90 2 B 5 A 20 6 G E 8 O 4 R 90 3 Q 15 C 20 8 D 90 22 P Capable of attack detection Real population on D’s neighbor Re-allocation strategy might be:

39 Scenario – Attacker’s Preparing Phase – Attack Detection(cont’) 2010/12/16 39 NTU OPLab Signal Strength 90 10 B 90 9 A 20 9 G 9 E 9 O 10 R 90 10 Q 90 9 C 20 9 D 90 9 P Capable of attack detection Real population on D’s neighbor Re-allocation strategy: Average Population Average the QoS impact caused by jamming

40 2010/12/16NTU OPLab 40 Scenario – Attacker’s Preparing Phase – Attack Detection(cont’)

41 2010/12/16NTU OPLab 41 Scenario – Attacker’s Preparing Phase – Attack Detection(cont’)

42 2010/12/16 42 NTU OPLab Signal Strength 90 2 B 5 A 20 6 G E 8 O 4 R 90 3 Q 15 C 20 8 D 90 22 P Capable of attack detection Real population on D’s neighbor Re-allocation strategy: Average Traffic Minimize the QoS impact caused by jamming

43 Scenario – Attacker’s Preparing Phase(cont’) 2010/12/16 43 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Attacker Nodes with more defense resource A B C D E F G HI J K L M N O PQ R S TU V W X

44 Scenario – Attacker’s Attacking Phase 2010/12/16 44 NTU OPLab A B C D E F G HI J K L M N O PQ R S TU V W X Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Jammed honeynode B Jammed node V with high population Jammed node P(not fake channel) Jammed normal node F Jammed honeynode U

45 Scenario – Attacker’s Attacking Phase(cont’) 2010/12/16 45 NTU OPLab A B C D E F G HI J K L M N O PQ R S TU V W X Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Range overlapped, the fake channel jammed. Although they seems overlapped, but the jammers attacked two different channel

46 Scenario – Defender’s Defending Phase 2010/12/16 46 NTU OPLab A B C D E F G HI J K L M N O PQ R S TU V W X Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource To minimize the total effectiveness of jamming, the defender will tend to remove these nodes first: 1.High population 2.Not fake channel Their sequence will be… 1)Jammed node V with high population 2)Jammed normal node F 3)Jammed node P(not fake channel) 5)Jammed honeynode U 4)Jammed honeynode B

47 Scenario – Defender’s Defending Phase - Channel Surfing 2010/12/16 47 NTU OPLab A B C D E F G HI J K L M N O PQ R S TU V W X Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource The function of channel surfing function: 1.Mitigate the impact of jamming Time Effectiveness Range overlapped. If the mesh router switch to other channel: 1.Jammed time shotened. 2.Jammers are not able to know which channel is the origin channel unless it’s compromised.

48 Scenario – Defender’s Defending Phase - Localization 2010/12/16 48 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Two types of locator: 1.Static 2.Mobile

49 Scenario – Defender’s Defending Phase - Localization 2010/12/16 49 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Static locator: 1.Mesh routers

50 Scenario – Defender’s Defending Phase - Localization 2010/12/16 50 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Static locator: 2.Reference points Deployed in the topology with the given density The density is defined as locater per length unit. In this case, the unit is 10 meter

51 Scenario – Defender’s Defending Phase - Localization 2010/12/16 51 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Mobile locator Capable of precise localization function Jammer which is not able to be approximately localized

52 Scenario – Defender’s Defending Phase - Localization 2010/12/16 52 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Mobile locator Reference point 1 Reference point 2

53 Scenario – Defender’s Defending Phase - Localization 2010/12/16 53 NTU OPLab Base Station Mesh router Honeynode Compromised mesh router Jammed mesh router Jammer Attacker Nodes with more defense resource Mobile locator Reference point 1 (useless) Reference point 2Multiple jammers Reference point 3 Reference point 4 One of the jammers removed

54 Mathematical Formulation

55 Assumptions 1.The communications between mesh routers and between mesh routers and mesh clients use different communication protocol. 2.All the packets are encrypted. Thus, the attacker can’t directly obtain information in the communication channels. 3.The defender has complete information of the network which is attacked by a single attacker with different strategies. 4.The attacker is not aware of the topology of the network. Namely, it doesn’t know that there are honeynodes in the network and which nodes are important, i.e., the attacker only has incomplete information of the network. 2010/12/16 55 NTU OPLab

56 Assumptions(cont’) 5.There are two kinds of defense resources, the non-deception based resources and the deception based resources. 6.There are multiple jammers in the network, and their jamming ranges might be overlapped. 7.There is only constructive interference between jamming signals. 2010/12/16 56 NTU OPLab

57 Given parameters 2010/12/16NTU OPLab 57 NotationDescription NThe index set of all nodes HThe index set of all honeynodes PThe index set of the nodes with channel surfing technique QThe index set of the nodes with precise localization technique RThe index set of the nodes with detection technique

58 Given parameters 2010/12/16NTU OPLab 58 NotationDescription BThe defender’s total budget Z All possible attack configuration, including attacker’s attributes and corresponding strategies. E All possible defense configuration, including defense resources allocation and defending strategies FTotal attacking times of all attackers An attack configuration, including the attributes and corresponding strategies, where 1≤ i ≤ F 1 if the attacker can achieve his goal successfully, and 0 otherwise, where 1≤ i ≤ F

59 Given parameters 2010/12/16NTU OPLab 59 NotationDescription m(ρi)m(ρi) The cost of constructing a node with the quality with quality ρ i, where i ∈ N nini The non-deception based defense resources allocated to node i, where i ∈ N h(εi)h(εi) The cost of constructing a honeynode with the interactive capability ε i, where i ∈ H a(φ)a(φ) The cost of constructing static locators with the density φ b The cost of constructing a channel surfing function to one node c The cost of constructing a precise localization technique to one node d The cost of constructing a detection technique to one node t(ρi)t(ρi) The maximum traffic of node i with quality ρ i, where i ∈ N

60 Decision variables 2010/12/16NTU OPLab 60 NotationDescription The information regarding resources allocating and defending wiwi 1 if node i is equipped with honeynode function, and 0 otherwise, where i ∈ N xixi 1 if node i is equipped with channel surfing function, and 0 otherwise, where i ∈ N yiyi 1 if node i is implemented with precise localization technique, and 0 otherwise, where i ∈ N zizi 1 if node i is implemented with the detection technique, and 0 otherwise, where i ∈ N εiεi The interactive capability of honeypot i, where i ∈ N ρiρi The quality of node i, where i ∈ N φThe density of static locator

61 Objective function 2010/12/16NTU OPLab 61 (IP 1)

62 Constraints Defender’s budget constraints 2010/12/16NTU OPLab 62 (IP 1.1) (IP 1.2)

63 Constraints Defender’s budget constraints 2010/12/16NTU OPLab 63 (IP 1.3)

64 Constraints Defender’s budget constraints 2010/12/16NTU OPLab 64 (IP 1.6) (IP 1.7) (IP 1.5) (IP 1.4)

65 Constraints Defender’s budget constraints 2010/12/16NTU OPLab 65 (IP 1.10) (IP 1.9) (IP 1.8)

66 Constraints QoS constraints ▫ QoS is a function of: 1.BS loading 2.Utilization of mesh routers on the path to BS 3.Hops to core node 4.Fake traffic effect, 5.Population re-allocation effect 6.Channel surfing effect 7.Jammer removal 2010/12/16NTU OPLab 66 (IP 1.11)

67 Constraints QoS constraints ▫ ▫ The performance reduction cause by the jammed node should not violate IP1.11. ▫ The performance reduction cause by the channel surfing should not violate IP1.11. 2010/12/16NTU OPLab 67 (IP 1.12) (IP 1.13) (IP 1.14)

68 Constraints Channel surfing constraints ▫ The mesh router must equipped with channel surfing technique. ▫ The next channel to be selected must not be in use. ▫ Channel surfing function triggers only if the jammed channel is not a fake channel. Population re-allocation constraints ▫ The mesh clients to be re-allocated must be in the transmission range of the mesh routers other than current mesh router. ▫ The total traffic of the mesh router i after re-allocation must not exceed the maximum traffic limit t(ρ i ), where i ∈ N. 2010/12/16NTU OPLab 68 (IP 1.15) (IP 1.16) (IP 1.17) (IP 1.18) (IP 1.19)

69 Constraints Approximate localization ▫ There must be at least three available reference points which is under the effect of jamming attack in the jammed channel. Precise localization ▫ There must be at least one mobile locator in the network. Fake traffic ▫ The fake traffic sent to mesh router i from the honeynodes must not make it exceed the maximum traffic limit t(ρ i ), where i ∈ N 2010/12/16NTU OPLab 69 (IP 1.21) (IP 1.22) (IP 1.20)

70 Constraints 2010/12/16NTU OPLab 70 (IP 1.25) (IP 1.24) (IP 1.23) (IP 1.26) Integer constraints

71 The End Thanks for your attention. 2010/12/16 71 NTU OPLab


Download ppt "Research Direction Introduction Advisor: Professor Frank Y.S. Lin Present by Hubert J.W. Wang."

Similar presentations


Ads by Google