Monday, June 3, 2019
Mobile Ad Hoc Network Intrusion Detection System (IDS)
Mobile Ad Hoc Ne twainrk   invasion  spying  t slip byk (IDS)Chapter 11. IntroductionMobile ad hoc  profitss (MANETs) and    piano tuner   sensing element  net incomes (WSNs)  atomic number 18 relatively  clean  discourse paradigms. MANETs do not require expensive  swinish stations or  fit out infrastructure. Nodes  at bottom  inter f al unitedly range of  severally   oppositewise  terminate  submit   bid a shot over wireless links, and those that  ar  furthest a trigger use  some   separatewise  leaf  invitees as relays. Each host in a MANET  excessively acts as a router as routes  atomic number 18  or soly multichip. The  deficiency of  immovable infrastructure and centralized   spot  gos a MANET  fit for a broad range of  industrys in both  host and civilian environments. For example, a MANET could be deployed quickly for military  intercourses in the battlefield.A MANET also could be deployed quickly in scenarios  much(prenominal) as a meeting room, a  urban center transportation    wireless   net profit, for fire fighting, and so on. To  compliance such(prenominal) a  makeative and self configurable  profits,   to  individually one  sprightly host should be a  chummy  customer and  pull up stakesing to relay messages for  others. In the original design of a MANET, global trust fungusworthiness in nodes within the whole  net profit is a  primal  protection assumption. Recent progress in wireless communications and micro electro mechanical  governances (MEMS) technology has made it feasible to build  light wireless sensor nodes that integrate sensing,   breeding processing, and communicating capabilities. These miniature wireless sensor nodes  after part be extremely small, as tiny as a cubic centimeter. Comp atomic number 18d with  stodgy computers, the low-cost, battery-powered, sensor nodes  ease up a  particular energy supply, stringent processing and communications capabilities, and memory is scarce.The design and implementation of relevant services for WS   Ns  essential  defy these limitations in mind. Based on the  cooperative efforts of a large number of sensor nodes, WSNs  read become good  foundationdidates to provide economically viable solutions for a wide range of applications, such as environmental  supervise, scientific s elective course  breeding  collection, health  oversee, and military operations.Despite the wide  categorisation of potential applications, MANETs and WSNs often  ar deployed in adverse or  counterbalance hostile environments.  at that placefore, they  drive outnot be readily deployed without  first-year addressing  credentials challenges. Due to the features of an open  strength, the low degree of  sensible  earnest of  bustling nodes, a dynamic  analysis situs, a limited power supply, and the absence of a central management point, MANETs   atomic number 18    more(prenominal)(prenominal) vulnerable to malicious attacks than  handed-down  fit out ne bothrks  be. In WSNs, the lack of physical security combin   ed with unattended operations make sensor nodes prone to a high risk of  be captured and compromised, making WSNs vulnerable to a variety of attacks.A  sprightly ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of wandering nodes without the help of a fixed infrastructure or centralized management. Each node is equipped with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication range. In order for a node to forward a  piece of ground to a node that is out of its radio range, the cooperation of other nodes in the network is  requisite this is known as multi-hop communication.Therefore,  to  to each one one node must act as both a host and a router at the same time. The network topology frequently changes due to the mobility of mobile nodes as they  touch on within,  blend in into, or move out of the network.A MANET with the  indications  draw  to a higher place was originally dev   eloped for military purposes, as nodes argon scattered across a battlefield and there is no infrastructure to help them form a network. In recent years, MANETs have been developing rapidly and are increasingly being  utilize in  galore(postnominal) applications, ranging from military to civilian and  moneymaking(prenominal) uses, since setting up such networks can be done without the help of any infrastructure or interaction with a human. Some examples are search-and-rescue missions,   info collection, and virtual classrooms and conferences where laptops, PDA or other mobile devices share wireless medium and communicate to each other. As MANETs become widely used, the security  hack has become one of the primary concerns. For example, most of the routing protocols proposed for MANETs assume that  either node in the network is cooperative and not malicious 1. Therefore,  exactly one compromised node can cause the failure of the  broad(a) network.There are both passive and active atta   cks in MANETs. For passive at tacks,  piece of lands containing secret  entropy  cleverness be eavesdropped, which violates confidentiality. Active attacks, including injecting packets to invalid destinations into the network, deleting packets,  transfering the  confine of packets, and impersonating other nodes violate availability, integrity, au whereforetication, and non-repudiation. Proactive  approach  formes such as cryptography and au accordinglytication were first brought into consideration, and many techniques have been proposed and implemented. However, these applications are not sufficient. If we have the ability to  invent the attack once it comes into the network, we can stop it from doing any damage to the  carcass or any  data. Here is where the  misdemeanor  spying  dodge comes in. invasion   detecting can be defined as a process of monitoring activities in a system, which can be a computer or network system. The mechanism by which this is achieved is called an intrus   ion detective work system (IDS). An IDS collects activity information and then analyzes it to determine whether there are any activities that violate the security rules.  erst small-arm AN ID determines that an unusual activity or an activity that is known to be an attack occurs, it then generates an alarm to alert the security administrator. In addition, IDS can also  founding father a proper  solvent to the malicious activity. Although there are several intrusion  sleuthing techniques developed for wired networks today, they are not suitable for wireless networks due to the differences in their characteristics. Therefore, those techniques must be modified or new techniques must be developed to make intrusion  spying work in effect in MANETs.In this paper, we classify the computer computer architectures for IDS in MANETs, each of which is suitable for  disparate network infrastructures. Current intrusion  espial systems corresponding to those architectures are reviewed and compared   .Chapter 2 flat coat2.1  misdemeanor  detecting  agreement (IDS)Many historical events have shown that intrusion prevention techniques alone, such as  encoding and authentication, which are usually a first line of defense, are not sufficient. As the system become more complex, there are also more weaknesses, which lead to more security problems.  onslaught  sensing can be used as a second wall of defense to protect the network from such problems. If the intrusion is  detected, a response can be initiated to prevent or minimize damage to the system.To make intrusion  sleuthing systems work, basic assumptions are made. The first assumption is that user and  computer  planme activities are observable. The second assumption, which is more important, is that normal and intrusive activities must have distinct  bearings, as intrusion detection must capture and analyze system activity to determine if the system is under attack.Intrusion detection can be classified  base on   size up data as     each host- based or network-based. A network-based IDS captures and analyzes packets from network trac while a host-based IDS uses ope military rank system or application logs in its analysis. Based on detection techniques, IDS can also be classified into three categories as follows 2.Anomaly detection systems The normal profiles (or normal behaviors) of users are kept in the system. The system compares the captured data with these profiles, and then treats any activity that deviates from the baseline as a possible intrusion by informing system administrators or initializing a proper response. pervert detection systems The system keeps patterns (or signatures) of known attacks and uses them to compare with the captured data. Any matched pattern is treated as an intrusion. Like a computer virus detection system, it cannot detect new kinds of attacks.Specification-based detection The system defines a set of constraints that describe the correct operation of a program or protocol. Th   en, it monitors the execution of the program with respect to the defined constraints.2.2 Intrusion Detection in MANETsMany intrusion detection systems have been proposed in traditional wired networks, where all track must go  by means of switches, routers, or gateways. Hence, IDS can be added to and implemented in these devices easily 17, 18. On the other hand, MANETs do not have such devices. Moreover, the medium is wide open, so both  lucid and malicious users can access it. Furthermore, there is no clear separation between normal and unusual activities in a mobile environment. Since nodes can move arbitrarily, false routing information could be from a compromised node or a node that has outdated information. Thus, the current IDS techniques on wired networks cannot be applied directly to MANETs. Many intrusion detection systems have been proposed to suit the characteristics of MANETs,  whatever of which will be discussed in the  adjoining sections.2.3 Architectures for IDS in MAN   ETsThe network infrastructures that MANETs can be  assemble to are  either at or multi-layer, depending on the applications. Therefore, the optimal IDS architecture for a MANET may depend on the network infrastructure itself 9. In an network infrastructure, all nodes are considered equal, thus it may be suitable for applications such as virtual classrooms or conferences. On the contrary,  several(prenominal) nodes are considered different in the multi-layered network infrastructure. Nodes may be partitioned into  flocks with one  flock head for each  crew. To communicate within the cluster, nodes can communicate directly. However, communication across the clusters must be done through the cluster head. This infrastructure  faculty be  intimately suited for military applications.2.3.1 Stand-alone Intrusion Detection SystemsIn this architecture, an intrusion detection system is run on each node independently to determine intrusions.  each decision made is based  however on information     roll up at its own node, since there is no cooperation among nodes in the network. Therefore, no data is exchanged. Besides, nodes in the same network do not know anything about the situation on other nodes in the network as no alert information is passed. Although this architecture is not elective due to its limitations, it may be suitable in a network where not all nodes are capable of  rill IDS or have IDS installed. This architecture is also more suitable for an network infrastructure than for multi-layered network infrastructure. Since information on each individualnode might not be  enough to detect intrusions, this architecture has not been elect in most of the IDS for MANETs.2.3.2 Distributed and Cooperative Intrusion Detection SystemsSince the nature of MANETs is distributed and requires cooperation of other nodes, Zhang and  downwind 1 have proposed that the intrusion detection and response system in MANETs should also be both distributed and cooperative as shown in  lic   k 1. Every node participates in intrusion detection and response by having an IDS  means running on them. An IDS  instrument is  trustworthy for detecting and collecting  topical anesthetic events and data to identify possible intrusions, as well as initiating a response independently. However,  beside IDS  genes cooperatively participate in global intrusion detection actions when the  attest is inconclusive. Similarly to stand-alone IDS architecture, this architecture is more suitable for a network infrastructure, not multi-layered one.2.3.3 Hierarchical Intrusion Detection SystemsHierarchical IDS architectures extend the distributed and cooperative IDS architectures and have been proposed for multi-layered network infrastructures where the network is  shared into clusters. Clusterheads of each cluster usually have more functionality than other members in the clusters, for example routing packets across clusters. Thus, these cluster heads, in some sense, act as control points which    are similar to switches, routers, or gateways in wired networks. The same concept of multi-layering is applied to intrusion detection systems where hierarchical IDS architecture is proposed.Each IDS  broker is run on every member node and is  trusty  topical anestheticly for its node, i.e., monitoring and deciding on   topical anestheticly detected intrusions. A clusterhead is responsible  topical anestheticly for its node as well as globally for its cluster, e.g. monitoring network packets and initiating a global response when network intrusion is detected.2.3.4 Mobile Agent for Intrusion Detection SystemsA concept of mobile agents has been used in several techniques for intrusion detection systems in MANETs. Due to its ability to move through the large network, each mobile agent is assigned to perform  precisely one specific task, and then one or more mobile agents are distributed into each node in the network. This allows the distribution of the intrusion detection tasks. There    are several advantages for  employ mobile agents 2. Some functions are not assigned to every node thus, it helps to  shrink the consumption of power, which is scarce in mobile ad hoc networks.It also provides fault tolerance such that if the network is partitioned or some agents are destroyed, they are  pipe down able to work. Moreover, they are scalable in large and varied system environments, as mobile agents tend to be independent of platform architectures. However, these systems would require a secure module where mobile agents can be stationed to. Additionally, mobile agents must be able to protect themselves from the secure modules on remote hosts as well.Mobile-agent-based IDS can be considered as a distributed and cooper ative intrusion detection technique as  set forth in Section 3.2. Moreover, some techniques also use mobile agents combined with hierarchical IDS, for example, what will be described in Section 4.3.2.4 Sample Intrusion Detection Systems for MANETsSince the I   DS for traditional wired systems are not well-suited to MANETs, many researchers have proposed several IDS especially for MANETs, which some of them will be reviewed in this section.2.4.1 Distributed and Cooperative IDSAs described in Section 3.2, Zhang and Lee also proposed the  bewilder for distributed and cooperative IDS as shown in  bod 2 1.The model for an IDS agent is structured into six modules.The  topical anaesthetic data collection module collects real-time audit data, which includes system and user activities within its radio range. This  lay in data will be analyzed by the  local detection engine module for evidence of anomalies. If an anomaly is detected with strong evidence, the IDS agent can determine independently that the system is under attack and initiate a response through the local response module (i.e., alerting the local user) or the global response module (i.e., deciding on an action), depending on the  grammatical case of intrusion, the type of network proto   cols and applications, and the  evidence of the evidence. If an anomaly is detected with weak or inconclusive evidence, the IDS agent can request the cooperation of neighboring IDS agents through a cooperative detection engine module, which communicates to other agents through a secure communication module.2.4.2  topical anaesthetic Intrusion Detection System (LIDS)Albers et al. 3 proposed a distributed and collaborative architecture of IDS by using mobile agents. A Local Intrusion Detection System (LIDS) is implemented on every node for local concern, which can be extended for global concern by cooperating with other LIDS. Two types of data are exchanged among LIDS security data and intrusion alerts. In order to analyze the possible intrusion, data must be obtained from what the LIDS detect, along with additional information from other nodes. Other LIDS might be run on different operating systems or use data from different activities such as system, application, or network activiti   es therefore, the format of this raw data might be different, which makes it hard for LIDS to analyze. However, such difficulties can be solved by using SNMP (Simple Network Management Protocol) data located in MIBs (Management Information Base) as an audit data source. Such a data source not only eliminates those difficulties, but also reduces the in- turn 3 LIDS Architecture in A Mobile Node 3 crease in using additional resources to collect audit data if an SNMP agent is already run on each node.To obtain additional information from other nodes, the authors proposed mobile agents to be used to transport SNMP requests to other nodes. In another words, to distribute the intrusion detection tasks. The idea differs from traditional SNMP in that the traditional approach transfers data to the requesting node for computation while this approach brings the code to the data on the  bespeak node. This is initiated due to untrustworthiness of UDP messages practiced in SNMP and the active top   ology of MANETs. As a  resultant, the amount of exchanged data is tremendously reduced. Each mobile agent can be assigned a specific task which will be achieved in an autonomous and asynchronous fashion without any help from its LIDS. The LIDS architecture is shown in Figure 3, which consists of  Communication Framework To facilitate for both internal and external communication with a LIDS.Local LIDS Agent To be responsible for local intrusion detection and local response. Also, it reacts to intrusion alerts sent from other nodes to protect itself against this intrusion.Local MIB Agent To provide a means of collecting MIB variables for either mobile agents or the Local LIDS Agent. Local MIB Agent acts as an interface with SNMP agent, if SNMP exists and runs on the node, or with a tailor-made agent developed specifically to allow up- dates and retrievals of the MIB variables used by intrusion detection, if none exists.Mobile Agents (MA) They are distributed from its LID to collect an   d process data on other nodes. The results from their evaluation are then either sent back to their LIDS or sent to another node for  merely investigation.Mobile Agents Place To provide a security control to mobile agents.For the  methodology of detection, Local IDS Agent can use either anomaly or misuse detection. However, the combination of two mechanisms will offer the better model. Once the local intrusion is detected, the LIDS initiate a response and inform the other nodes in the network. Upon receiving an alert, the LIDS can protect itself against the intrusion.2.4.3 Distributed Intrusion Detection System Using Multiple SensorsKachirski and Guha 4 proposed a multi-sensor intrusion detection system based on mobile agent technology. The system can be divided into three main modules, each of which represents a mobile agent with  original func- tionality monitoring, decision-making or initiating a response. By separate in functional tasks into categories and assigning each task to    a different agent, the workload is distributed which is suitable for the characteristics of MANETs. In addition, the hierarchical structure of agents is also developed in this intrusion detection system as shown in Figure 4.Monitoring agent Two functions are carried out at this class of agent network monitoring and host monitoring. A host-based monitor agent hosting system-level sensors and user-activity sensors is run on every node to monitor within the node, while a monitor agent with a network monitoring sensor is run only on some selected nodes to monitor at packet-level to capture packets going through the network within its radio ranges.Action agent Every node also hosts this action agent. Since every node hosts a host-based monitoring agent, it can determine if there is any suspicious or unusual activities on the host node based on anomaly detection. When there is strong evidence supporting the anomaly detected, this action agent can initiate a response, such as terminating    the process or blocking a user from the network.Decision agent The decision agent is run only on certain nodes, mostly those nodes that run network monitoring agents. These nodes collect all packets within its radio range and analyze them to determine whether the network is under attack. Moreover, from the previous paragraph, if the local detection agent cannot make a decision on its own due to insufficient evidence, its local detection agent reports to this decision agent in order to investigate further. This is done by using packet-monitoring results that comes from the network-monitoring sensor that is running locally. If the decision agent concludes that the node is malicious, the action module of the agent running on that node as described above will carry out the response.The network is logically divided into clusters with a single cluster head for each cluster. This clusterhead will monitor the packets within the cluster and only packets whose originators are in the same clus   ter are captured and investigated. This means that the network monitoring agent (with network monitoring sensor) and the decision agent are run on the cluster head. In this mechanism, the decision agent performs the decision-making based on its own collected information from its network-monitoring sensor thus, other nodes have no influence on its decision. This way, spooffing attacks and false accusations can be prevented.2.4.4 Dynamic Hierarchical Intrusion Detection ArchitectureSince nodes move arbitrarily across the network, a  nonmoving power structure is not suitable for such dynamic network topology. Sterne et al. 16 proposed a dynamic intrusion detection hierarchy that is potentially scalable to large networks by using clustering like those in Section 4.3 and 5.5. However, it can be structured in more than two levels as shown in Figure 5. Nodes  label 1 are the first level clusterheads while nodes labeled 2 are the second level clusterheads and so on. Members of the first lev   el of the cluster are called leaf nodes.Every node has the responsibilities of monitoring (by accumulating counts and statistics), logging, analyzing (i.e., attack signature matching or checking on packet headers and payloads), responding to intrusions detected if there is enough evidence, and alerting or reporting to cluster heads. Clues treads, in addition, must also performData fusion/integration and data  step-down Clusterheads aggregate and correlate reports from members of the cluster and data of their own. Data reduction may be involved to  countermand conflicting data, bogus data and overlapping reports. Besides, cluster heads may send the requests to their children for additional information in order to correlate reports correctly. Intrusion detection computations Since different attacks require different sets of detected data, data on a single node might not be able to detect the attack, e.g., DDoS attack, and thus clusterheads also analyze the consolidated data before  li   berty chit to  speeding levels.Security Management The  uppermost levels of the hierarchy have the authority and responsibility for managing the detection and response capabilities of the clusters and cluster heads below them. They may send the signatures  modify, or directives and policies to alter the configurations for intrusion detection and response. These update and directives will flow from the top of the hierarchy to the bottom. To form the hierarchical structure, every node uses clustering, which is typically used in MANETs to construct routes, to self-organize into local neighborhoods (first level clusters) and then select neighborhood representatives (cluster heads). These representatives then use clustering to organize themselves into the second level and select the representatives. This process continues until all nodes in the network are part of the hierarchy. The authors also suggested criteria on selecting cluster heads. Some of these criteria areConnectivity the num   ber of nodes within one hopProximity members should be within one hop of its cluster headResistance to compromise (hardening) the probability that the node will not be compromised. This is very important for the upper level cluster heads.Processing power, memory capacity, energy remaining, bandwidth cape abilitiesAdditionally, this proposed architecture does not rely solely on promiscuous node monitoring like many proposed architectures, due to its unreliability as described in. Therefore, thisarchitecture also supports direct periodic reporting where packet counts and statistics are sent to monitoring nodes periodically.2.4.5 Zone-Based Intrusion Detection System (ZBIDS)Sun et al. 24 has proposed an anomaly-based two-level no overlapping Zone-Based Intrusion Detection System (ZBIDS). By dividing the network in Figure 6 into nonoverlapping  regularizes ( geographical zone A to zone me), nodes can be categorized into two types the intrazone node and the interzone node (or a gateway n   ode). Considering only zone E, node 5, 9, 10 and 11 are intrazone nodes, while node 2, 3, 6, and 8 are interzone nodes which have physical connections to nodes in other zones. The formation and maintenance of zones requires each node to know its own physical  muddle and to map its location to a zone map, which requires prior design setup.Each node has an IDS agent run on it which the model of the agent is shown in Figure 7. Similar to an IDS agent proposed by Zhang and Lee (Figure 2), the data collection module and the detection engine are re-sponsible for collecting local audit data (for instance, system call activities, and system log les) and analyzing collected data for any sign of intrusion respectively. In addition, there may be more than one for each of these modules which allows collecting data from various sources and using different detection techniques to improve the detection performance.The local aggregation and correlation (LACE) module is responsible for combining the    results of these local detection engines and generating alerts if any abnormal behavior is detected. These alerts are broadcasted to other nodes within the same zone. However, for the global aggregation and correlation (GACE), its functionality depends on the type of the node. As described in Figure 7,if the node is an intrazone node, it only sends the generated alerts to the interzone nodes. Whereas, if the node is an interzone node, it receives alerts from other intrazone nodes, aggregates and correlates those alerts with its own alerts, and then generates alarms. Moreover, the GACE also cooperates with the GACEs of the neighboring interzone nodes to have more accurate information to detect the intrusion. Lastly, the intrusion response module is responsible for handling the alarms generated from the GACE. The local aggregation and correlationAlgorithm used in ZBIDS is based on a local Markov  range of mountains anomaly detection. IDS agent rust creates a normal profile by constru   cting a Markov chain from the routing  save. A valid change in the routing cache can be characterized by the Markov chain detection model with probabilities, otherwise, its considered abnormal, and the alert will be generated. For the global aggregation and correlation algorithm, its based on information provided in the received alerts containing the type, the time, and the source of the attacks.2.5 Intrusion Detection Techniques for Node Cooperation in MANETsSince there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in 5 show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose p   unishment as well 6, 7.2.5.1 Watchdog and PathraterTwo techniques were proposed by Marti, Giuli, and Baker 5,  watchdog and pathrater, to be added on top of the  sample routing protocol in ad hoc networks. The standard is Dynamic Source Routing protocol (DSR) 8. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A pathrater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defined at the source node. This routing information is passed together with the message through intermediate nodes until it reaches the destination. Therefore, each intermediate node in the path should know who the next hop node is. In addition, listening to the next hops transmission is possible because of the characteristic of wireless networks  if node A is within range of node B, A can overhear communication to and from B.Figure 8 shows how the watchdog works. Assume that node S wants to send a packet to node D, whi   ch there exists a path from S to D through nodes A, B, and C. Consider now that A has already received a packet from S destined to D. The packet contains a message and routing information. When A forwards this packet to B, A also keeps a  repeat of the packet in its buffer. Then, it promiscuously listens to the transmission of B to make sure that B forwards to C. If the packet overheard from B (represented by a dashed line) matches that stored in the buffer, it means that B really forwards to the next hop (represented as a solid line). It then removes the packet from the buffer. However, if theres no matched packet after a certain time, the watchdog increments the failures counter for node B. If this counter exceeds the threshold, A concludes that B is misbehaving and reports to the source node S.Path rater performs the  computing of the path metric for each path. By keeping the rating of every node in the network that it knows, the path metric can be  figure by combining the node r   ating together with link re- liability, which is collected from past experience. Obtaining the path metric for all available paths, the pathrater can choose the path with the highest metric. In addition, if there is no such link reliability information, the path metric enables the pathrater to select the shortest path too. As a result, paths containing misbehaving nodes will be avoided.From the result of the simulation, the system with these two techniques is quite  effective for choosing paths to avoid misbehaving nodes. However, those misbehaving nodes are not punished. In contrast, they even benefit from the network. Therefore, misbehaving nodes are encouraged to continue their behaviors.Chapter 33.  literary productions survey3.1 IntroductionThe rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The nature of mobility creates new vulnerabilities that do not exist in a fixed wired network, and yet many of the    proven security measures turn out to be ineffective. Therefore, the traditional way of protecting networks with firewalls and encryption software is no longer sufficient. We need to develop new architecture and mechanisms to protect the wireless networks and mobile computing applications. The implication of mobile computing on network security research can be further demonstrated by the follow case. Recently (Summer 2001) an Internet worm called Code Red has spread rapidly to  vitiate many of the Windows-based server machines.To prevent this type of worm attacks from spreading into intranets, many. This paperMobile Ad Hoc Network Intrusion Detection System (IDS)Mobile Ad Hoc Network Intrusion Detection System (IDS)Chapter 11. IntroductionMobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are relatively new communication paradigms. MANETs do not require expensive base stations or wired infrastructure. Nodes within radio range of each other can communicate directly ov   er wireless links, and those that are far apart use other nodes as relays. Each host in a MANET also acts as a router as routes are mostly multichip. The lack of fixed infrastructure and centralized authority makes a MANET suitable for a broad range of applications in both military and civilian environments. For example, a MANET could be deployed quickly for military communications in the battlefield.A MANET also could be deployed quickly in scenarios such as a meeting room, a city transportation wireless network, for fire fighting, and so on. To form such a cooperative and self configurable network, every mobile host should be a friendly node and willing to relay messages for others. In the original design of a MANET, global trustworthiness in nodes within the whole network is a fundamental security assumption. Recent progress in wireless communications and micro electro mechanical systems (MEMS) technology has made it feasible to build miniature wireless sensor nodes that integrat   e sensing, data processing, and communicating capabilities. These miniature wireless sensor nodes can be extremely small, as tiny as a cubic centimeter. Compared with conventional computers, the low-cost, battery-powered, sensor nodes have a limited energy supply, stringent processing and communications capabilities, and memory is scarce.The design and implementation of relevant services for WSNs must keep these limitations in mind. Based on the collaborative efforts of a large number of sensor nodes, WSNs have become good candidates to provide economically viable solutions for a wide range of applications, such as environmental monitoring, scientific data collection, health monitoring, and military operations.Despite the wide variety of potential applications, MANETs and WSNs often are deployed in adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Due to the features of an open medium, the low degree of phy   sical security of mobile nodes, a dynamic topology, a limited power supply, and the absence of a central management point, MANETs are more vulnerable to malicious attacks than traditional wired networks are. In WSNs, the lack of physical security combined with unattended operations make sensor nodes prone to a high risk of being captured and compromised, making WSNs vulnerable to a variety of attacks.A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Each node is equipped with a wireless transmitter and receiver, which allow it to communicate with other nodes in its radio communication range. In order for a node to forward a packet to a node that is out of its radio range, the cooperation of other nodes in the network is needed this is known as multi-hop communication.Therefore, each node must act as both a host and a router at the same time.    The network topology frequently changes due to the mobility of mobile nodes as they move within, move into, or move out of the network.A MANET with the characteristics described above was originally developed for military purposes, as nodes are scattered across a battlefield and there is no infrastructure to help them form a network. In recent years, MANETs have been developing rapidly and are increasingly being used in many applications, ranging from military to civilian and commercial uses, since setting up such networks can be done without the help of any infrastructure or interaction with a human. Some examples are search-and-rescue missions, data collection, and virtual classrooms and conferences where laptops, PDA or other mobile devices share wireless medium and communicate to each other. As MANETs become widely used, the security issue has become one of the primary concerns. For example, most of the routing protocols proposed for MANETs assume that every node in the network    is cooperative and not malicious 1. Therefore, only one compromised node can cause the failure of the entire network.There are both passive and active attacks in MANETs. For passive at tacks, packets containing secret information might be eavesdropped, which violates confidentiality. Active attacks, including injecting packets to invalid destinations into the network, deleting packets, modifying the contents of packets, and impersonating other nodes violate availability, integrity, authentication, and non-repudiation. Proactive approaches such as cryptography and authentication were first brought into consideration, and many techniques have been proposed and implemented. However, these applications are not sufficient. If we have the ability to detect the attack once it comes into the network, we can stop it from doing any damage to the system or any data. Here is where the intrusion detection system comes in.Intrusion detection can be defined as a process of monitoring activities in    a system, which can be a computer or network system. The mechanism by which this is achieved is called an intrusion detection system (IDS). An IDS collects activity information and then analyzes it to determine whether there are any activities that violate the security rules. Once AN ID determines that an unusual activity or an activity that is known to be an attack occurs, it then generates an alarm to alert the security administrator. In addition, IDS can also initiate a proper response to the malicious activity. Although there are several intrusion detection techniques developed for wired networks today, they are not suitable for wireless networks due to the differences in their characteristics. Therefore, those techniques must be modified or new techniques must be developed to make intrusion detection work effectively in MANETs.In this paper, we classify the architectures for IDS in MANETs, each of which is suitable for different network infrastructures. Current intrusion detec   tion systems corresponding to those architectures are reviewed and compared.Chapter 2Background2.1 Intrusion Detection System (IDS)Many historical events have shown that intrusion prevention techniques alone, such as encryption and authentication, which are usually a first line of defense, are not sufficient. As the system become more complex, there are also more weaknesses, which lead to more security problems. Intrusion detection can be used as a second wall of defense to protect the network from such problems. If the intrusion is detected, a response can be initiated to prevent or minimize damage to the system.To make intrusion detection systems work, basic assumptions are made. The first assumption is that user and program activities are observable. The second assumption, which is more important, is that normal and intrusive activities must have distinct behaviors, as intrusion detection must capture and analyze system activity to determine if the system is under attack.Intrusio   n detection can be classified based on audit data as either host- based or network-based. A network-based IDS captures and analyzes packets from network trac while a host-based IDS uses operating system or application logs in its analysis. Based on detection techniques, IDS can also be classified into three categories as follows 2.Anomaly detection systems The normal profiles (or normal behaviors) of users are kept in the system. The system compares the captured data with these profiles, and then treats any activity that deviates from the baseline as a possible intrusion by informing system administrators or initializing a proper response.Misuse detection systems The system keeps patterns (or signatures) of known attacks and uses them to compare with the captured data. Any matched pattern is treated as an intrusion. Like a virus detection system, it cannot detect new kinds of attacks.Specification-based detection The system defines a set of constraints that describe the correct oper   ation of a program or protocol. Then, it monitors the execution of the program with respect to the defined constraints.2.2 Intrusion Detection in MANETsMany intrusion detection systems have been proposed in traditional wired networks, where all track must go through switches, routers, or gateways. Hence, IDS can be added to and implemented in these devices easily 17, 18. On the other hand, MANETs do not have such devices. Moreover, the medium is wide open, so both legitimate and malicious users can access it. Furthermore, there is no clear separation between normal and unusual activities in a mobile environment. Since nodes can move arbitrarily, false routing information could be from a compromised node or a node that has outdated information. Thus, the current IDS techniques on wired networks cannot be applied directly to MANETs. Many intrusion detection systems have been proposed to suit the characteristics of MANETs, some of which will be discussed in the next sections.2.3 Archit   ectures for IDS in MANETsThe network infrastructures that MANETs can be configured to are either at or multi-layer, depending on the applications. Therefore, the optimal IDS architecture for a MANET may depend on the network infrastructure itself 9. In an network infrastructure, all nodes are considered equal, thus it may be suitable for applications such as virtual classrooms or conferences. On the contrary, some nodes are considered different in the multi-layered network infrastructure. Nodes may be partitioned into clusters with one cluster head for each cluster. To communicate within the cluster, nodes can communicate directly. However, communication across the clusters must be done through the cluster head. This infrastructure might be well suited for military applications.2.3.1 Stand-alone Intrusion Detection SystemsIn this architecture, an intrusion detection system is run on each node independently to determine intrusions. Every decision made is based only on information col   lected at its own node, since there is no cooperation among nodes in the network. Therefore, no data is exchanged. Besides, nodes in the same network do not know anything about the situation on other nodes in the network as no alert information is passed. Although this architecture is not elective due to its limitations, it may be suitable in a network where not all nodes are capable of running IDS or have IDS installed. This architecture is also more suitable for an network infrastructure than for multi-layered network infrastructure. Since information on each individualnode might not be enough to detect intrusions, this architecture has not been chosen in most of the IDS for MANETs.2.3.2 Distributed and Cooperative Intrusion Detection SystemsSince the nature of MANETs is distributed and requires cooperation of other nodes, Zhang and Lee 1 have proposed that the intrusion detection and response system in MANETs should also be both distributed and cooperative as shown in Figure 1. E   very node participates in intrusion detection and response by having an IDS agent running on them. An IDS agent is responsible for detecting and collecting local events and data to identify possible intrusions, as well as initiating a response independently. However, neighboring IDS agents cooperatively participate in global intrusion detection actions when the evidence is inconclusive. Similarly to stand-alone IDS architecture, this architecture is more suitable for a network infrastructure, not multi-layered one.2.3.3 Hierarchical Intrusion Detection SystemsHierarchical IDS architectures extend the distributed and cooperative IDS architectures and have been proposed for multi-layered network infrastructures where the network is divided into clusters. Clusterheads of each cluster usually have more functionality than other members in the clusters, for example routing packets across clusters. Thus, these cluster heads, in some sense, act as control points which are similar to switche   s, routers, or gateways in wired networks. The same concept of multi-layering is applied to intrusion detection systems where hierarchical IDS architecture is proposed.Each IDS agent is run on every member node and is responsible locally for its node, i.e., monitoring and deciding on locally detected intrusions. A clusterhead is responsible locally for its node as well as globally for its cluster, e.g. monitoring network packets and initiating a global response when network intrusion is detected.2.3.4 Mobile Agent for Intrusion Detection SystemsA concept of mobile agents has been used in several techniques for intrusion detection systems in MANETs. Due to its ability to move through the large network, each mobile agent is assigned to perform only one specific task, and then one or more mobile agents are distributed into each node in the network. This allows the distribution of the intrusion detection tasks. There are several advantages for using mobile agents 2. Some functions are n   ot assigned to every node thus, it helps to reduce the consumption of power, which is scarce in mobile ad hoc networks.It also provides fault tolerance such that if the network is partitioned or some agents are destroyed, they are still able to work. Moreover, they are scalable in large and varied system environments, as mobile agents tend to be independent of platform architectures. However, these systems would require a secure module where mobile agents can be stationed to. Additionally, mobile agents must be able to protect themselves from the secure modules on remote hosts as well.Mobile-agent-based IDS can be considered as a distributed and cooper ative intrusion detection technique as described in Section 3.2. Moreover, some techniques also use mobile agents combined with hierarchical IDS, for example, what will be described in Section 4.3.2.4 Sample Intrusion Detection Systems for MANETsSince the IDS for traditional wired systems are not well-suited to MANETs, many researcher   s have proposed several IDS especially for MANETs, which some of them will be reviewed in this section.2.4.1 Distributed and Cooperative IDSAs described in Section 3.2, Zhang and Lee also proposed the model for distributed and cooperative IDS as shown in Figure 2 1.The model for an IDS agent is structured into six modules.The local data collection module collects real-time audit data, which includes system and user activities within its radio range. This collected data will be analyzed by the local detection engine module for evidence of anomalies. If an anomaly is detected with strong evidence, the IDS agent can determine independently that the system is under attack and initiate a response through the local response module (i.e., alerting the local user) or the global response module (i.e., deciding on an action), depending on the type of intrusion, the type of network protocols and applications, and the certainty of the evidence. If an anomaly is detected with weak or inconclusiv   e evidence, the IDS agent can request the cooperation of neighboring IDS agents through a cooperative detection engine module, which communicates to other agents through a secure communication module.2.4.2 Local Intrusion Detection System (LIDS)Albers et al. 3 proposed a distributed and collaborative architecture of IDS by using mobile agents. A Local Intrusion Detection System (LIDS) is implemented on every node for local concern, which can be extended for global concern by cooperating with other LIDS. Two types of data are exchanged among LIDS security data and intrusion alerts. In order to analyze the possible intrusion, data must be obtained from what the LIDS detect, along with additional information from other nodes. Other LIDS might be run on different operating systems or use data from different activities such as system, application, or network activities therefore, the format of this raw data might be different, which makes it hard for LIDS to analyze. However, such diffic   ulties can be solved by using SNMP (Simple Network Management Protocol) data located in MIBs (Management Information Base) as an audit data source. Such a data source not only eliminates those difficulties, but also reduces the in-Figure 3 LIDS Architecture in A Mobile Node 3 crease in using additional resources to collect audit data if an SNMP agent is already run on each node.To obtain additional information from other nodes, the authors proposed mobile agents to be used to transport SNMP requests to other nodes. In another words, to distribute the intrusion detection tasks. The idea differs from traditional SNMP in that the traditional approach transfers data to the requesting node for computation while this approach brings the code to the data on the requested node. This is initiated due to untrustworthiness of UDP messages practiced in SNMP and the active topology of MANETs. As a result, the amount of exchanged data is tremendously reduced. Each mobile agent can be assigned a s   pecific task which will be achieved in an autonomous and asynchronous fashion without any help from its LIDS. The LIDS architecture is shown in Figure 3, which consists of  Communication Framework To facilitate for both internal and external communication with a LIDS.Local LIDS Agent To be responsible for local intrusion detection and local response. Also, it reacts to intrusion alerts sent from other nodes to protect itself against this intrusion.Local MIB Agent To provide a means of collecting MIB variables for either mobile agents or the Local LIDS Agent. Local MIB Agent acts as an interface with SNMP agent, if SNMP exists and runs on the node, or with a tailor-made agent developed specifically to allow up- dates and retrievals of the MIB variables used by intrusion detection, if none exists.Mobile Agents (MA) They are distributed from its LID to collect and process data on other nodes. The results from their evaluation are then either sent back to their LIDS or sent to another n   ode for further investigation.Mobile Agents Place To provide a security control to mobile agents.For the methodology of detection, Local IDS Agent can use either anomaly or misuse detection. However, the combination of two mechanisms will offer the better model. Once the local intrusion is detected, the LIDS initiate a response and inform the other nodes in the network. Upon receiving an alert, the LIDS can protect itself against the intrusion.2.4.3 Distributed Intrusion Detection System Using Multiple SensorsKachirski and Guha 4 proposed a multi-sensor intrusion detection system based on mobile agent technology. The system can be divided into three main modules, each of which represents a mobile agent with certain func- tionality monitoring, decision-making or initiating a response. By separate in functional tasks into categories and assigning each task to a different agent, the workload is distributed which is suitable for the characteristics of MANETs. In addition, the hierarchic   al structure of agents is also developed in this intrusion detection system as shown in Figure 4.Monitoring agent Two functions are carried out at this class of agent network monitoring and host monitoring. A host-based monitor agent hosting system-level sensors and user-activity sensors is run on every node to monitor within the node, while a monitor agent with a network monitoring sensor is run only on some selected nodes to monitor at packet-level to capture packets going through the network within its radio ranges.Action agent Every node also hosts this action agent. Since every node hosts a host-based monitoring agent, it can determine if there is any suspicious or unusual activities on the host node based on anomaly detection. When there is strong evidence supporting the anomaly detected, this action agent can initiate a response, such as terminating the process or blocking a user from the network.Decision agent The decision agent is run only on certain nodes, mostly those nod   es that run network monitoring agents. These nodes collect all packets within its radio range and analyze them to determine whether the network is under attack. Moreover, from the previous paragraph, if the local detection agent cannot make a decision on its own due to insufficient evidence, its local detection agent reports to this decision agent in order to investigate further. This is done by using packet-monitoring results that comes from the network-monitoring sensor that is running locally. If the decision agent concludes that the node is malicious, the action module of the agent running on that node as described above will carry out the response.The network is logically divided into clusters with a single cluster head for each cluster. This clusterhead will monitor the packets within the cluster and only packets whose originators are in the same cluster are captured and investigated. This means that the network monitoring agent (with network monitoring sensor) and the decisio   n agent are run on the cluster head. In this mechanism, the decision agent performs the decision-making based on its own collected information from its network-monitoring sensor thus, other nodes have no influence on its decision. This way, spooffing attacks and false accusations can be prevented.2.4.4 Dynamic Hierarchical Intrusion Detection ArchitectureSince nodes move arbitrarily across the network, a static hierarchy is not suitable for such dynamic network topology. Sterne et al. 16 proposed a dynamic intrusion detection hierarchy that is potentially scalable to large networks by using clustering like those in Section 4.3 and 5.5. However, it can be structured in more than two levels as shown in Figure 5. Nodes labeled 1 are the first level clusterheads while nodes labeled 2 are the second level clusterheads and so on. Members of the first level of the cluster are called leaf nodes.Every node has the responsibilities of monitoring (by accumulating counts and statistics), loggin   g, analyzing (i.e., attack signature matching or checking on packet headers and payloads), responding to intrusions detected if there is enough evidence, and alerting or reporting to cluster heads. Clues treads, in addition, must also performData fusion/integration and data reduction Clusterheads aggregate and correlate reports from members of the cluster and data of their own. Data reduction may be involved to avoid conflicting data, bogus data and overlapping reports. Besides, cluster heads may send the requests to their children for additional information in order to correlate reports correctly. Intrusion detection computations Since different attacks require different sets of detected data, data on a single node might not be able to detect the attack, e.g., DDoS attack, and thus clusterheads also analyze the consolidated data before passing to upper levels.Security Management The uppermost levels of the hierarchy have the authority and responsibility for managing the detection a   nd response capabilities of the clusters and cluster heads below them. They may send the signatures update, or directives and policies to alter the configurations for intrusion detection and response. These update and directives will flow from the top of the hierarchy to the bottom. To form the hierarchical structure, every node uses clustering, which is typically used in MANETs to construct routes, to self-organize into local neighborhoods (first level clusters) and then select neighborhood representatives (cluster heads). These representatives then use clustering to organize themselves into the second level and select the representatives. This process continues until all nodes in the network are part of the hierarchy. The authors also suggested criteria on selecting cluster heads. Some of these criteria areConnectivity the number of nodes within one hopProximity members should be within one hop of its cluster headResistance to compromise (hardening) the probability that the node w   ill not be compromised. This is very important for the upper level cluster heads.Processing power, storage capacity, energy remaining, bandwidth cape abilitiesAdditionally, this proposed architecture does not rely solely on promiscuous node monitoring like many proposed architectures, due to its unreliability as described in. Therefore, thisarchitecture also supports direct periodic reporting where packet counts and statistics are sent to monitoring nodes periodically.2.4.5 Zone-Based Intrusion Detection System (ZBIDS)Sun et al. 24 has proposed an anomaly-based two-level no overlapping Zone-Based Intrusion Detection System (ZBIDS). By dividing the network in Figure 6 into nonoverlapping zones (zone A to zone me), nodes can be categorized into two types the intrazone node and the interzone node (or a gateway node). Considering only zone E, node 5, 9, 10 and 11 are intrazone nodes, while node 2, 3, 6, and 8 are interzone nodes which have physical connections to nodes in other zones. T   he formation and maintenance of zones requires each node to know its own physical location and to map its location to a zone map, which requires prior design setup.Each node has an IDS agent run on it which the model of the agent is shown in Figure 7. Similar to an IDS agent proposed by Zhang and Lee (Figure 2), the data collection module and the detection engine are re-sponsible for collecting local audit data (for instance, system call activities, and system log les) and analyzing collected data for any sign of intrusion respectively. In addition, there may be more than one for each of these modules which allows collecting data from various sources and using different detection techniques to improve the detection performance.The local aggregation and correlation (LACE) module is responsible for combining the results of these local detection engines and generating alerts if any abnormal behavior is detected. These alerts are broadcasted to other nodes within the same zone. However,    for the global aggregation and correlation (GACE), its functionality depends on the type of the node. As described in Figure 7,if the node is an intrazone node, it only sends the generated alerts to the interzone nodes. Whereas, if the node is an interzone node, it receives alerts from other intrazone nodes, aggregates and correlates those alerts with its own alerts, and then generates alarms. Moreover, the GACE also cooperates with the GACEs of the neighboring interzone nodes to have more accurate information to detect the intrusion. Lastly, the intrusion response module is responsible for handling the alarms generated from the GACE. The local aggregation and correlationAlgorithm used in ZBIDS is based on a local Markov chain anomaly detection. IDS agent rust creates a normal profile by constructing a Markov chain from the routing cache. A valid change in the routing cache can be characterized by the Markov chain detection model with probabilities, otherwise, its considered abnorm   al, and the alert will be generated. For the global aggregation and correlation algorithm, its based on information provided in the received alerts containing the type, the time, and the source of the attacks.2.5 Intrusion Detection Techniques for Node Cooperation in MANETsSince there is no infrastructure in mobile ad hoc networks, each node must rely on other nodes for cooperation in routing and forwarding packets to the destination. Intermediate nodes might agree to forward the packets but actually drop or modify them because they are misbehaving. The simulations in 5 show that only a few misbehaving nodes can degrade the performance of the entire system. There are several proposed techniques and protocols to detect such misbehavior in order to avoid those nodes, and some schemes also propose punishment as well 6, 7.2.5.1 Watchdog and PathraterTwo techniques were proposed by Marti, Giuli, and Baker 5, watchdog and pathrater, to be added on top of the standard routing protocol in a   d hoc networks. The standard is Dynamic Source Routing protocol (DSR) 8. A watchdog identifies the misbehaving nodes by eavesdropping on the transmission of the next hop. A pathrater then helps to find the routes that do not contain those nodes. In DSR, the routing information is defined at the source node. This routing information is passed together with the message through intermediate nodes until it reaches the destination. Therefore, each intermediate node in the path should know who the next hop node is. In addition, listening to the next hops transmission is possible because of the characteristic of wireless networks  if node A is within range of node B, A can overhear communication to and from B.Figure 8 shows how the watchdog works. Assume that node S wants to send a packet to node D, which there exists a path from S to D through nodes A, B, and C. Consider now that A has already received a packet from S destined to D. The packet contains a message and routing information. W   hen A forwards this packet to B, A also keeps a copy of the packet in its buffer. Then, it promiscuously listens to the transmission of B to make sure that B forwards to C. If the packet overheard from B (represented by a dashed line) matches that stored in the buffer, it means that B really forwards to the next hop (represented as a solid line). It then removes the packet from the buffer. However, if theres no matched packet after a certain time, the watchdog increments the failures counter for node B. If this counter exceeds the threshold, A concludes that B is misbehaving and reports to the source node S.Path rater performs the calculation of the path metric for each path. By keeping the rating of every node in the network that it knows, the path metric can be calculated by combining the node rating together with link re- liability, which is collected from past experience. Obtaining the path metric for all available paths, the pathrater can choose the path with the highest metric   . In addition, if there is no such link reliability information, the path metric enables the pathrater to select the shortest path too. As a result, paths containing misbehaving nodes will be avoided.From the result of the simulation, the system with these two techniques is quite effective for choosing paths to avoid misbehaving nodes. However, those misbehaving nodes are not punished. In contrast, they even benefit from the network. Therefore, misbehaving nodes are encouraged to continue their behaviors.Chapter 33. Literature survey3.1 IntroductionThe rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The nature of mobility creates new vulnerabilities that do not exist in a fixed wired network, and yet many of the proven security measures turn out to be ineffective. Therefore, the traditional way of protecting networks with firewalls and encryption software is no longer sufficient. We need to develop new archite   cture and mechanisms to protect the wireless networks and mobile computing applications. The implication of mobile computing on network security research can be further demonstrated by the follow case. Recently (Summer 2001) an Internet worm called Code Red has spread rapidly to infect many of the Windows-based server machines.To prevent this type of worm attacks from spreading into intranets, many. This paper  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.