intrusion detection techniques for mobile wireless networks

34
Intrusion Detection Techniques for Mobile Wireless Networks Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha

Upload: andres

Post on 17-Jan-2016

41 views

Category:

Documents


0 download

DESCRIPTION

Intrusion Detection Techniques for Mobile Wireless Networks. Zhang, Lee, Yi-An Huang Presented by: Alex Singh and Nabil Taha. Outline. Introduction Intrusion Detection and the Challenges of Mobile Ad-Hoc Networks An Architecture for Intrusion Detection - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Intrusion Detection Techniques for Mobile Wireless Networks

Intrusion Detection Techniques for Mobile Wireless Networks

Zhang, Lee, Yi-An Huang

Presented by: Alex Singh and Nabil Taha

Page 2: Intrusion Detection Techniques for Mobile Wireless Networks

Outline

1. Introduction

2. Intrusion Detection and the Challenges of Mobile Ad-Hoc Networks

3. An Architecture for Intrusion Detection

4. Anomaly Detection in Mobile Ad-Hoc Networks

5. Experimental Results

6. Conclusion

Page 3: Intrusion Detection Techniques for Mobile Wireless Networks

Introduction

• Rapid proliferation of wireless networks changed the landscape of network security

• Traditional firewalls and encryption software no longer sufficient

• Need new mechanisms to protect wireless networks and mobile computing application

Page 4: Intrusion Detection Techniques for Mobile Wireless Networks

Checklist

• Examine vulnerabilities of wireless networks

• Discuss intrusion detection in security architecture for mobile computing environment

• Evaluate such architecture through simulation experiments

Page 5: Intrusion Detection Techniques for Mobile Wireless Networks

Vulnerabilities of Wireless Networks

• Wireless links leaves the network susceptible to– Passive eavesdropping– Active interfering

• Mobile nodes are capable of roaming independently

• Decision-making in wireless networks rely on cooperative algorithms

Page 6: Intrusion Detection Techniques for Mobile Wireless Networks

Intrusion Detection and the Challenges of Mobile Ad-Hoc

Networks• Intrusion – Any set of actions that attempt

to compromise the integrity, confidentiality, or availability of a resource

• Intrusion Prevention – Primary defense (i.e. Passwords, Biometrics)

• Intrusion Detection Systems (IDSs)– Second wall of defense

Page 7: Intrusion Detection Techniques for Mobile Wireless Networks

Categories of IDSs

• Network-based IDS – Runs at the gateway of a network and examines network packets that go through the network hardware interface

• Host-based IDS – Relies on operating system audit data to monitor and analyze the events generated by programs or users on the host

Page 8: Intrusion Detection Techniques for Mobile Wireless Networks

Intrusion Detection Techniques

• Misuse Detection – uses patterns of well known attacks or weak spots to identify known intrusions.– ex: guessing

password, locks account after 4 failed attempts.

– Lacks ability to detect newly invented attacks

• Anomaly Detection – flags activates that differ significantly from the established normal usage.– ex: frequency of

program usage much lower or much higher than normal usage

– Does not need prior knowledge of attacks

– High false positive rate

Page 9: Intrusion Detection Techniques for Mobile Wireless Networks

Problems with current IDSs

• Fixed infrastructure IDS techniques can not be directly applied to mobile ad-hoc networks– Rely on real-time traffic analysis– Must be done at the system for mobile ad-hoc

networks and not at a gateway, switch or router

• Mobile users tend to adopt new operations modes such as disconnected operations

Page 10: Intrusion Detection Techniques for Mobile Wireless Networks

Questions for a Viable IDSs

• What is a good system architecture for building intrusion detection and response systems

• What are the appropriate audit data sources and how do we detect anomaly based on partial, local audit traces

• What is a good model of activities in a mobile computing environment that can separate an anomaly from normalcy

Page 11: Intrusion Detection Techniques for Mobile Wireless Networks

An Architecture for Intrusion Detection

Page 12: Intrusion Detection Techniques for Mobile Wireless Networks

IDS agent

Page 13: Intrusion Detection Techniques for Mobile Wireless Networks

Data Collection

• Gathers streams of real-time audit data from various sources

• Includes:– System activities– User activities– Communication activities by this node– Communication activities by other nodes within this

radio range

• This supports multi-layered intrusion detection method

Page 14: Intrusion Detection Techniques for Mobile Wireless Networks

Local Detection

• The local detection engine analyzes the local data traces gathered by the local data collection module for evidence of anomalies.

• Includes both misuse detection or anomaly detection

Page 15: Intrusion Detection Techniques for Mobile Wireless Networks

Cooperative Detection

• Any node can initiate a response if it has strong enough evidence about intrusion

• If the node only has weak or inconclusive evidence, it can warrant a broader investigation

• Possible to detect intrusion even when evidence at individual nodes is weak

Page 16: Intrusion Detection Techniques for Mobile Wireless Networks

Intrusion Response

• The type of intrusion response depends on:– Type of intrusion– Type of network protocols– Type of applications– Confidence (or certainty) in the evidence

• Typical Responses:– Re-initiate communication channels between nodes– Identify compromised node and exclude it

Page 17: Intrusion Detection Techniques for Mobile Wireless Networks

Multi-Layer Integrated Intrusion Detection and Response

• With wireless networks, there are vulnerabilities in multiple layers and intrusion detection module needs to be placed at each layer on each node

• Need to coordinate intrusion detection and response efforts between layers

• Enables us to analyze the attack scenario in its entirety

Page 18: Intrusion Detection Techniques for Mobile Wireless Networks

Anomaly Detection in Mobile Ad-Hoc Networks

• Anomaly detection works on the premise that there is intrinsic and observable characteristic of normal behavior that is distinct from that of abnormal behavior

• We can use a classifier, trained using normal data, to predict what is normally the next event given the previous n events

Page 19: Intrusion Detection Techniques for Mobile Wireless Networks

Procedure for Anomaly Detection

1. Select audit data

2. Perform appropriate data transformation

3. Compute classifier using training data

4. Apply classifier to test data

5. Post-process alarms to produce intrusion reports

Page 20: Intrusion Detection Techniques for Mobile Wireless Networks

Attack on Routing Protocols

• Route Logic Compromise – Manipulating routing information– Misrouting: forwarding a packet to an incorrect node– False Message Propagation: distributing a false route

update

• Traffic Patter Distortion – Changes default/normal traffic behavior– Packet dropping– Packet generation with faked source address– Corruption on packet contents– Denial-of-service

Page 21: Intrusion Detection Techniques for Mobile Wireless Networks

Audit Data

• Local Routing Information, including cache entries and traffic statistics

• Position locater or GPS which is assumed to not be compromised

• Only local information is used since remote nodes can be compromised

Page 22: Intrusion Detection Techniques for Mobile Wireless Networks

Feature Selection

• Since we use classifiers as detectors we need to select/construct features from the available audit data

• A large feature set is first constructed to cover a wide range of behaviors

• Several training runs are conducted and features that occur more than a minimum threshold are selected into the Essential Feature Set

Page 23: Intrusion Detection Techniques for Mobile Wireless Networks

Classifier

• Two classifiers were used in the study• RIPPER – A rule induction program,

searches the given feature space and computes rules that separate data in appropriate classes

• SVM light – Support Vector Machine classifier, pre-process the data to represent patterns in much higher dimension than the given feature space

Page 24: Intrusion Detection Techniques for Mobile Wireless Networks

Post-processing

• Choose a parameter l and let the window size be 2l+1

• For a region in the current window if there are more abnormal than normal predictions then the entire region is marked abnormal

• Shift the window and repeat• Count all continuous abnormal regions as

one intrusion session

Page 25: Intrusion Detection Techniques for Mobile Wireless Networks

Detecting Abnormal Updates to Routing Tables

• Routing table contains at a minimum the next hop to each destination node and the distance

• Physical movement is measured by distance and velocity

• The routing table change is measured by the percentage of changed routes – PCR

• And the percentage of changes of all hops of all the routes – PCH

Page 26: Intrusion Detection Techniques for Mobile Wireless Networks

Computing Normal Profile

• Denote PCR the class (i.e. concept), and distance, velocity, and PCH, etc. the features describing the concept;

• Use n classes to represent the PCR values in n ranges, ex, we can use 10 classes each representing 10 percentage points - that is, the trace data belongs to n classes

• Apply a classification algorithm to the data to learn a classifier for PCR

• Repeat the above for PCH, that is, learn a classifier for PCH

Page 27: Intrusion Detection Techniques for Mobile Wireless Networks

Finding Anomalies

• If abnormal data is not available compute clusters of the deviation scores where each score pair is a point (PCR, PCH) then the outliers can be considered anomalies

Page 28: Intrusion Detection Techniques for Mobile Wireless Networks

Detecting Abnormal Activities in Other Layers

• Anomaly detection in other layers (MAC protocols, application, services, etc.) use a similar approach

• MAC protocols- form cluster using the deviations of the total number of channel requests and the total number of nodes making the request during a time period s

Page 29: Intrusion Detection Techniques for Mobile Wireless Networks

Experimental Results

Page 30: Intrusion Detection Techniques for Mobile Wireless Networks
Page 31: Intrusion Detection Techniques for Mobile Wireless Networks

Discussion

• Anomaly detection works much better on a routing protocol in which a degree of redundancy exists within infrastructure

• DSR embeds a whole source route in each packet dispatched– This makes it harder to hide intrusion by

faking a bit of routing information

Page 32: Intrusion Detection Techniques for Mobile Wireless Networks

Conclusions

• Mobile Wireless networks require different techniques to detect intrusions

• Anomaly detection is a critical part of component of intrusion detection and response

• Trace analysis and anomaly detection should be done locally and possibly through cooperation with all nodes in the network

• Paper focused on ad-hoc routing protocols since they are the foundation of a mobile ad-hoc network

Page 33: Intrusion Detection Techniques for Mobile Wireless Networks

Conclusions – Routing Protocols

• Use anomaly detection models constructed using information available from the routing protocols

• Apply RIPPER and SVM Light to compute classifiers

• Showed that these detectors in general have good detection performance with SVM Light having better performance

Page 34: Intrusion Detection Techniques for Mobile Wireless Networks

Conclusions - findings

• They noted some disparity in security performance among different types of routing protocols

• They claimed that protocols with strong correlation among changes of different types of information(location, track and routing message) tend to have better detection performance

• And on-demand protocols usually work better than table-driven protocols