Misuse Detection and Prevention in Ad-hoc Networks
نویسندگان
چکیده
Generally, a computer using a wireless network will communicate to other computers through a base station. The base station transmits and receives packets wirelessly, but also connects to a landline and a wired network (ie. the Internet). However, there are situations where a base station does not exist, but users still wish to transmit to other computers. Situations like this include Native American reservations, underdeveloped nations and mobile warfare scenarios. There exist users with wireless connections, but no wired network infrastructure. Base station installations and an underlying wired network would be too costly. The solution to these situations is ad-hoc networking. Each wireless computer has a range for its transmission. If the source wants to transmit information to a destination computer and it is not within range, it will use its neighbors to relay the message. Unfortunately, with this type of networking, new security issues are introduced. In a wired scenario with base stations, all traffic with pass through a relatively small number of points. Security monitoring for various attacks can be done at these points. In ad hoc networks, these points do not exist, so a new system must be developed. In this project, we consider two separate types of systems, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). An IDS system raises alerts whenever bad traffic is discovered. Bad traffic is any packets that when received and processed by the destination, might be harmful to a system. An IPS actively drops bad traffic when it is discovered. In both systems, the goal is to use the fewest resources, but still guarantee that all traffic will be analyzed. In IDS, this means all bad packets should be detected. In IPS, this means all bad packets should be dropped. IDS systems take advantage of the promiscuous mode of operation in wireless because a node can listen to all the transmissions in his range. To minimized resource consumption, the goal of IDS becomes running the system on the fewest number of nodes possible, yet still guarantee complete coverage by guaranteeing the transmission of each node will be heard by at least on node running detection software. We consider a simple dominating set (DS) node selection algorithm and compare it to a naïve algorithm where each node activates its detection software with certain probability. In this project, the DS algorithm is proven to guarantee complete coverage, is implemented and compared to an implementation of RP. Promiscuous mode allows a node to listen to all traffic in range, but this is not as beneficial to an IPS because the nodes must be able to stop a bad packet’s transmission after it is detected. So, the node must be able to somehow control the packets transmission. One way to solve this problem is to have the scanning node tell the transmitting node not to send a bad packet after it is detected, but this would mean that nodes have to hold each packet until receiving a response from an IPS active neighbor, which is basically unfeasible. So, for a bad packet to feasibly be dropped, one node along its path must be running IPS to drop the packet. So, the goal of IPS becomes scanning each packet once along the path. We consider four different modes of operation, first hop, last hop, both first and last hop and randomly placed any hop.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005