Intrusion Detection for Mobile Ad Hoc Networks



Similar documents
Intrusion Detection Systems

INTRUSION DETECTION SYSTEMS and Network Security

CHAPTER 1 INTRODUCTION

Taxonomy of Intrusion Detection System

CSCE 465 Computer & Network Security

Intrusion Detection Systems Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science

Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Performance Evaluation of Intrusion Detection Systems

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Intrusion Detection. Tianen Liu. May 22, paper will look at different kinds of intrusion detection systems, different ways of

Firewalls, Tunnels, and Network Intrusion Detection

Intrusion Detection from Simple to Cloud

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

CSCI 4250/6250 Fall 2015 Computer and Networks Security

SURVEY OF INTRUSION DETECTION SYSTEM

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Intrusion Detection for Grid and Cloud Computing

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Radware s Behavioral Server Cracking Protection

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Intrusion Detection Systems

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs

Role of Anomaly IDS in Network

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS / IPS. James E. Thiel S.W.A.T.

A Review on Intrusion Detection System to Protect Cloud Data

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Chap. 1: Introduction

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

How To Manage Security On A Networked Computer System

Intrusion Detection Systems

Security for Ad Hoc Networks. Hang Zhao

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2. Intrusion Detection and Prevention Systems

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

NETWORK SECURITY (W/LAB) Course Syllabus

Architecture Overview

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Observation and Findings

Intrusion Detection System (IDS)

Intruders & Intrusion Hackers Criminal groups Insiders. Detection and IDS Techniques Detection Principles Requirements Host-based Network-based

Introduction of Intrusion Detection Systems

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Security in Ad Hoc Network

Security Issues in Mobile Ad Hoc Networks - A Survey

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Wireless Sensor Networks Chapter 14: Security in WSNs

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Intruders and viruses. 8: Network Security 8-1

Chapter 9 Firewalls and Intrusion Prevention Systems

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

The Truth about False Positives

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SCADA SYSTEMS AND SECURITY WHITEPAPER

Cisco IPS Tuning Overview

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Complete Protection against Evolving DDoS Threats

The Comprehensive Guide to PCI Security Standards Compliance

Name. Description. Rationale

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

IY2760/CS3760: Part 6. IY2760: Part 6

Cryptography and Network Security

CorreLog Alignment to PCI Security Standards Compliance

INTRUSION DETECTION IN MOBILE AD HOC NETWORKS

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Current and Future Research into Network Security Prof. Madjid Merabti

74% 96 Action Items. Compliance

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

AdSec: A System for Adaptive Network Security

Transcription:

Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering tchen@engr.smu.edu http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1

Outline Security problems in MANETs Role of intrusion detection systems (IDSs) General IDS techniques Challenges for IDS in MANETs Some research problems TC/Rockwell/5-20-04 SMU Engineering p. 2

Wireless Security Security for wireless networks is much harder than wired networks - Radio links are vulnerable to attacks from a distance, whereas wired links require physical access - Passive attacks (eavesdropping) are easy - Active attacks (masquerading, packet modification/interception, denial of service, ) are easy TC/Rockwell/5-20-04 SMU Engineering p. 3

Security in MANETs Ad hoc networks present additional security problems - Mobile nodes are more vulnerable to capture or compromise - Proper routing operation of MANET depends on cooperation of all nodes -- compromised nodes may disrupt entire network - No fixed infrastructure to support security, eg, authentication server -- nodes must handle security by themselves TC/Rockwell/5-20-04 SMU Engineering p. 4

Role of Intrusion Detection Security is based on cryptography which helps to - Keep data confidential - Authenticate the identity of hosts - Validate data integrity But cryptography is not sufficient protection - will not prevent attacks or prevent hosts from capture TC/Rockwell/5-20-04 SMU Engineering p. 5

Intrusion Detection (cont) IDSs are part of typical defense in depth strategies - Various security components form layers of protection against attacks - Goal is not perfect protection, but make attackers spend more effort (cost) TC/Rockwell/5-20-04 SMU Engineering p. 6

Defense in Depth Perimeter defense: firewalls, VPNs Monitor exterior: intrusion detection Core access: access control TC/Rockwell/5-20-04 SMU Engineering p. 7

Role of Intrusion Detection By analogy, castle is protected by walls, locked doors, moat, vault -- preventive layers IDSs serve as burglar alarms -- reactive layer - Useful complement to preventive layers TC/Rockwell/5-20-04 SMU Engineering p. 8

Intrusion Detection (cont) 1980 James Anderson wrote report for US Air Force proposed a method for filtering computer audit trails and detecting unusual usage patterns through statistical analysis 1986 Dorothy Denning and Peter Neumann developed real-time IDES (Intrusion Detection Expert System) for US Navy and prototyped at SRI Int. TC/Rockwell/5-20-04 SMU Engineering p. 9

Intrusion Detection (cont) - Anomaly detector characterized statistics of abnormal behavior - Expert system applied rules to detect security violations 1990 UC Davis developed NSM (Network System Monitor), first IDS to analyze network traffic TC/Rockwell/5-20-04 SMU Engineering p. 10

Intrusion Detection (cont) 1992 DIDS (Distributed Intrusion Detection System) was large-scale R&D project between various labs and military agencies - In response to 1988 Morris worm - Goal to integrate IDSs across networks to centrally track security violations and intrusions TC/Rockwell/5-20-04 SMU Engineering p. 11

Intrusion Detection (cont) 1998 DARPA sponsored an Intrusion Detection Evaluation of many IDSs - Found to be somewhat effective but some attacks not detected - More R&D needed to improve accuracy 2000 research on intrusion detection for ad hoc networks -- open problem TC/Rockwell/5-20-04 SMU Engineering p. 12

IDS Basic Functions Sensors Analysis Response Continually monitor activities (packet traffic or host behavior) Automatically recognize suspicious, malicious, or inappropriate activities Trigger alarms to system administrator TC/Rockwell/5-20-04 SMU Engineering p. 13

Types of IDSs IDSs can be classified according to their sensing: host-based or network-based Host IDS Network IDS Network IDS Host IDS TC/Rockwell/5-20-04 SMU Engineering p. 14

Types of IDSs (cont) Host-based IDS: monitor host activities (audit trails) - Most reliable detection, but does not scale well (with increasing number of hosts) Network-based IDS: monitor packet traffic - Scalable but detection accuracy is problematic TC/Rockwell/5-20-04 SMU Engineering p. 15

Types of IDSs (cont) IDSs can also be classified according to their analysis - Misuse (signature-based) detection Monitored activity is compared to set of signatures (patterns) for known attacks Alarm if a signature matches TC/Rockwell/5-20-04 SMU Engineering p. 16

Types of IDSs (cont) - Anomaly (behavior-based) detection Any behavior outside of a normal profile is considered suspicious Typically statistical analysis TC/Rockwell/5-20-04 SMU Engineering p. 17

Misuse Detection Most common approach Definition of signatures is critical - Too narrow or incomplete signatures will miss some attacks -- false negatives - Too broad signatures will raise false alarms -- false positives Unknown new attacks will likely be missed -- need constant updating TC/Rockwell/5-20-04 SMU Engineering p. 18

Anomaly Detection Potential to detect new types of attack that are different from normal behavior - Very difficult in practice because normal behavior is hard to define Non-normal behavior may be suspicious but not malicious -- high false positives rate - Additional processing to identify malicious TC/Rockwell/5-20-04 SMU Engineering p. 19

MANET Challenges for IDSs No natural points for monitoring (usually routers, firewalls, base stations, and other traffic concentration points in fixed networks) - Sensors may not see all traffic Hosts are more vulnerable to capture or compromise - Host-based IDS may be compromised TC/Rockwell/5-20-04 SMU Engineering p. 20

MANET Challenges (cont) Hosts may be disconnected at times - Signature updates cannot be reliably distributed Dynamically changing topology makes centralized analysis and correlation difficult - Nodes must depend on own analysis TC/Rockwell/5-20-04 SMU Engineering p. 21

IDS Functions Distributed Sensing - Each mobile host relies on own observations and cannot fully trust other hosts Analysis - Each mobile host relies on own analysis Response - Mostly independent but cooperation possible TC/Rockwell/5-20-04 SMU Engineering p. 22

Some Research Problems Most research focus on detecting and reacting to attacks by compromised nodes on ad hoc routing protocols - Interference with route discovery process - Advertisements of false routing information - Packet misrouting or dropping - Packet corruption is possible but protectable by cryptographic methods TC/Rockwell/5-20-04 SMU Engineering p. 23

Basic Approach Each mobile node runs an IDS independently - Observes behavior of neighboring nodes - Looks for signs of intrusion locally - Makes decisions and takes actions independently - Can request data or actions from neighboring nodes if needed TC/Rockwell/5-20-04 SMU Engineering p. 24

IDS Functional Model Audit trails Local data collection Local detection engine Local response Neighboring nodes Secure communication Cooperative detection engine Global response TC/Rockwell/5-20-04 SMU Engineering p. 25

IDS Functions Data collection: - Collect local audit traces and activity logs Local detection engine: - Analyzes local data for anomalies Cooperative detection engine: - Requests data from other hosts if necessary TC/Rockwell/5-20-04 SMU Engineering p. 26

IDS Functions (cont) Local response: - Alarms communicated to other nodes Global response: - Coordinated actions with neighboring nodes, triggered by any received alarms Secure communication: - Private, secure messaging with other hosts TC/Rockwell/5-20-04 SMU Engineering p. 27

Interference with Routing False routing info could come from external attackers - Protectable by usual cryptographic authentication methods (digital signatures) to verify source identity of routing info More serious problem is false routing info or misrouting behavior from (internal) compromised hosts TC/Rockwell/5-20-04 SMU Engineering p. 28

Routing Interference (cont) Verifying identity of internal host does not mean it can be trusted - Compromised hosts can own legitimate keys - Assume that compromised hosts will behave differently - Even if a node appears to be advertising invalid routing info, very hard to determine whether node is compromised or out of sync due to topology changes TC/Rockwell/5-20-04 SMU Engineering p. 29

Approach to Detection General approach is to monitor behavior of neighboring nodes (sometimes called a watchdog ) and rate their trustworthiness - Measure frequency of dropping or misrouting packets, or invalid routing info advertisements (open problem) - Rate trustworthiness of nodes TC/Rockwell/5-20-04 SMU Engineering p. 30

Approach (cont) A pathrater keeps track of trustworthiness rating of every known node - Calculates path metrics by averaging node ratings in the path -- goal to avoid untrustworthy nodes - Other path metrics are possible, eg, exclude paths with untrustworthy nodes (open problem) TC/Rockwell/5-20-04 SMU Engineering p. 31

Some Open Problems IDS accuracy is always critical issue - Most IDSs suffer from high rate of false positives or false negatives - Can misbehaving or compromised ad hoc nodes be identified reliably? When IDSs are so distributed in MANETs, and nodes cannot be trusted, can intrusion detection be guaranteed to work? TC/Rockwell/5-20-04 SMU Engineering p. 32

Open Problems (cont) - Would like to use some kind of distributed trust model -- a majority consensus of nodes can be trusted - But if majority of mobile nodes are compromised, intrusion detection may fail Protection of IDS against attacks - Knowledgable attackers might defeat IDS by overloading, evasion, etc. TC/Rockwell/5-20-04 SMU Engineering p. 33