SlideShare ist ein Scribd-Unternehmen logo
1 von 28
INTRUSION DETECTION TECHNIQUES
FOR MOBILE WIRELESS NETWORKS
Y Zhang, W Lee & Y Huang


Presenter: Tanzir Musabbir
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
VULNERABILITIES OF MOBILE WIRELESS
NETWORKS

 The wireless networks and mobile computing has
  developed rapidly in the last decade
 Traditional way of protecting networks is no longer
  sufficient
 Use of wireless links increases attacks ranging from
  passive eavesdropping to active interfering.
 Missing of physical access and unprepared for
  possible encounters
 Damage includes leaking secret information,
  message contamination, node impersonation
VULNERABILITIES OF MOBILE WIRELESS
NETWORKS (CONTINUED)

 Independent roaming could cause node to be
  captured, hijacked
 Tracking is difficult in a global scale network

 Lack of centralized authority creates new types of
  attacks to break the cooperative algorithms
 Application and services can be a wink link

 Attacks may target proxies or agents of base-
  station to mount DoS attacks
SOLUTION?
 Design a model for Intrusion Detection Techniques
  (IDS)
 Deploy IDS into wireless networks

 Keep the wireless networks secured from intrusions
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
WHAT IS IDS
 Intrusion: Any set of actions that attempt to
  compromise the integrity, confidentiality, or
  availability of a resource
 Intrusion detection: A detection technique that
  attempts to identify unauthorized, illicit, and
  anomalous behavior based solely on network
  traffic.
 The role of a IDS is passive, only gathering,
  identifying, logging and altering.
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
TYPES OF IDS
 Based on the type of audit data
 Network-based IDS
     Runs at the gateway of a network
     Inspects packets that go through the network hardware
      interface
   Host-based IDS
     Runs on the operating system audit data
     Monitors and analyzes events generated by programs
      or users
TYPES OF IDS (CONTINUED)
   Misuse detection system
     Uses patterns of well known attacks or weak spots
     Accurately detects instances of known attacks
     Fails to detected newly invented attacks

   Anomaly detection system
     Observes activities that different from the established
      usage way
     Does not require prior knowledge and detects new
      intrusion
     Fails to describe the type of attack
     May have high false positive rate
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
PROBLEMS OF CURRENT IDS TECHNIQUES
 Current IDS relies on real-time traffic analysis
 Mobile ad hoc environment does not have switches,
  routers and gateway, where the IDS can be used to
  audit data
 Mobile users may adopt new operations modes, so
  anomaly based IDS cannot be used in all cases
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
IDS DESIGN ISSUES
 To build an intrusion detection system that fits the
  feature of mobile ad-hoc networks
 To chose the audit data sources appropriately

 To design a model of activities that can separate
  anomaly from normalcy during attacks
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
ARCHITECTURE FOR INTRUSION DETECTION
 Intrusion detection and response system should be
  both distributed and cooperative
 Every node in the mobile ad-hoc network
  participates in intrusion detection and response
 Each node is responsible for detecting signs of
  intrusion locally and independently
 Individual IDS agents are placed on each and every
  node
 Each IDS agent monitors local activities
ARCHITECTURE FOR INTRUSION DETECTION
ARCHITECTURE FOR INTRUSION DETECTION
(CONTINUED)
 Data collection module is
  responsible for gathering local
  audit traces
 Local detection engine will use
  this data to detect local
  anomaly
 Cooperative detection engines
  collaborates IDS agents
ARCHITECTURE FOR INTRUSION DETECTION
(CONTINUED)
 Local response module triggers
  actions local to the node
 Global response module
  coordinates actions among
  neighboring nodes
 Secure communication module
  provides a high-confidence
  communication channel among
  IDS agents
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
ANOMALY DETECTION IN MOBILE AD-HOC
NETWORKS
 Differentiate normal behavior from abnormal
  behavior
 Uses information-theoretic technique to describe
  the characteristics of information flow
 Uses classification algorithms to build anomaly
  detection models
ANOMALY DETECTION IN MOBILE AD-HOC
NETWORKS (CONTINUED)
   Procedure for anomaly detection
       Select audit data so that the normal dataset has low
        entropy
       Perform appropriate data transformation according to
        the entropy measures (for information gain)
       Compute classifier using training data
       Apply the classifier to test data
       Post-process alarms to produce intrusion reports
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
EXPERIMENTAL RESULTS
   Used three specific ad-hoc wireless protocols
     DSR
     AODV
     DSDV

 The feature set reflects information from different
  sources such as traffic pattern, routing change,
  topological movement
 Built models using two classification algorithms
     RIPPER (induction based classifier)
     SVM_Light

   Five different test scripts were used to generate
    traces
EXPERIMENTAL RESULTS (CONTINUED)
   Experiment suggested that DSR and AODV are
    better for anomaly detection.
       Works better where degree of path and pattern
        redundancy exists
   High correlation among changes of three types of
    information is proffered:
     Traffic flow
     Routing activities
     Topological patterns
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
CONCLUSION
 Architecture for better intrusion detection in mobile
  computing environment should be distributed and
  cooperative.
 On demand protocols are work better than table
  driven protocols because the behavior of on-
  demand protocols reflects the correlation between
  traffic pattern and routing message flows
QUESTIONS?
 Location-Aided Routing protocol may be more
  advantageous – why?
 Why the alarm rate is much higher if the model is
  classified using values from another mobility level?

Weitere ähnliche Inhalte

Was ist angesagt?

Intermediate code generation in Compiler Design
Intermediate code generation in Compiler DesignIntermediate code generation in Compiler Design
Intermediate code generation in Compiler DesignKuppusamy P
 
Design & Analysis of Algorithms Lecture Notes
Design & Analysis of Algorithms Lecture NotesDesign & Analysis of Algorithms Lecture Notes
Design & Analysis of Algorithms Lecture NotesFellowBuddy.com
 
Functional verification techniques EW16 session
Functional verification techniques  EW16 sessionFunctional verification techniques  EW16 session
Functional verification techniques EW16 sessionSameh El-Ashry
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process FrameworkJAINAM KAPADIYA
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGSathya R
 
Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Dr. Pankaj Agarwal
 
Slice Based testing and Object Oriented Testing
Slice Based testing and Object Oriented TestingSlice Based testing and Object Oriented Testing
Slice Based testing and Object Oriented Testingvarsha sharma
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler DesignKuppusamy P
 
Software Measurement and Metrics.pptx
Software Measurement and Metrics.pptxSoftware Measurement and Metrics.pptx
Software Measurement and Metrics.pptxubaidullah75790
 
Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Muhammad Hammad Waseem
 
UVM Methodology Tutorial
UVM Methodology TutorialUVM Methodology Tutorial
UVM Methodology TutorialArrow Devices
 
Top Down Parsing, Predictive Parsing
Top Down Parsing, Predictive ParsingTop Down Parsing, Predictive Parsing
Top Down Parsing, Predictive ParsingTanzeela_Hussain
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)Amit Dahal
 
System verilog control flow
System verilog control flowSystem verilog control flow
System verilog control flowPushpa Yakkala
 
Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processorMazin Alwaaly
 

Was ist angesagt? (20)

Intermediate code generation in Compiler Design
Intermediate code generation in Compiler DesignIntermediate code generation in Compiler Design
Intermediate code generation in Compiler Design
 
Design & Analysis of Algorithms Lecture Notes
Design & Analysis of Algorithms Lecture NotesDesign & Analysis of Algorithms Lecture Notes
Design & Analysis of Algorithms Lecture Notes
 
Functional verification techniques EW16 session
Functional verification techniques  EW16 sessionFunctional verification techniques  EW16 session
Functional verification techniques EW16 session
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
Basic of compiler
Basic of compiler Basic of compiler
Basic of compiler
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTING
 
Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis Introduction to Algorithms Complexity Analysis
Introduction to Algorithms Complexity Analysis
 
Compiler Chapter 1
Compiler Chapter 1Compiler Chapter 1
Compiler Chapter 1
 
Slice Based testing and Object Oriented Testing
Slice Based testing and Object Oriented TestingSlice Based testing and Object Oriented Testing
Slice Based testing and Object Oriented Testing
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler Design
 
Software Measurement and Metrics.pptx
Software Measurement and Metrics.pptxSoftware Measurement and Metrics.pptx
Software Measurement and Metrics.pptx
 
system verilog
system verilogsystem verilog
system verilog
 
Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]Data Structures - Lecture 1 [introduction]
Data Structures - Lecture 1 [introduction]
 
UVM Methodology Tutorial
UVM Methodology TutorialUVM Methodology Tutorial
UVM Methodology Tutorial
 
Top Down Parsing, Predictive Parsing
Top Down Parsing, Predictive ParsingTop Down Parsing, Predictive Parsing
Top Down Parsing, Predictive Parsing
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)
 
System verilog control flow
System verilog control flowSystem verilog control flow
System verilog control flow
 
Computer architecture multi processor
Computer architecture multi processorComputer architecture multi processor
Computer architecture multi processor
 
Chapter 5 Syntax Directed Translation
Chapter 5   Syntax Directed TranslationChapter 5   Syntax Directed Translation
Chapter 5 Syntax Directed Translation
 

Andere mochten auch

INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Regional Center for the Arts
Regional Center for the ArtsRegional Center for the Arts
Regional Center for the Artsjlaposta
 
Blurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and EngineeringBlurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and Engineeringjlaposta
 
Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012lucasmpavelski
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersAmr Abed
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detectionCanSecWest
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
SEED PROCESSING PLANT
SEED PROCESSING PLANT SEED PROCESSING PLANT
SEED PROCESSING PLANT harryraj
 
1. seed & grain cleaning & grading
1. seed & grain cleaning & grading1. seed & grain cleaning & grading
1. seed & grain cleaning & gradingSANJEEV SAGAR
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION khanam22
 
Harmony search algorithm
Harmony search algorithmHarmony search algorithm
Harmony search algorithmAhmed Fouad Ali
 
Co-operative Societies
Co-operative SocietiesCo-operative Societies
Co-operative SocietiesNishant Nair
 

Andere mochten auch (20)

INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Regional Center for the Arts
Regional Center for the ArtsRegional Center for the Arts
Regional Center for the Arts
 
Blurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and EngineeringBlurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and Engineering
 
Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Harmony search presentation
Harmony search presentationHarmony search presentation
Harmony search presentation
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux Containers
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
SEED PROCESSING PLANT
SEED PROCESSING PLANT SEED PROCESSING PLANT
SEED PROCESSING PLANT
 
1. seed & grain cleaning & grading
1. seed & grain cleaning & grading1. seed & grain cleaning & grading
1. seed & grain cleaning & grading
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
 
Harmony search algorithm
Harmony search algorithmHarmony search algorithm
Harmony search algorithm
 
Co-operative Societies
Co-operative SocietiesCo-operative Societies
Co-operative Societies
 
Cooperative Society
Cooperative SocietyCooperative Society
Cooperative Society
 
Amul case study
Amul case studyAmul case study
Amul case study
 

Ähnlich wie Intrusion Detection Techniques for Mobile Wireless Networks

A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detectionmtamilpriya
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
 

Ähnlich wie Intrusion Detection Techniques for Mobile Wireless Networks (20)

A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 

Intrusion Detection Techniques for Mobile Wireless Networks

  • 1. INTRUSION DETECTION TECHNIQUES FOR MOBILE WIRELESS NETWORKS Y Zhang, W Lee & Y Huang Presenter: Tanzir Musabbir
  • 2. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 3. VULNERABILITIES OF MOBILE WIRELESS NETWORKS  The wireless networks and mobile computing has developed rapidly in the last decade  Traditional way of protecting networks is no longer sufficient  Use of wireless links increases attacks ranging from passive eavesdropping to active interfering.  Missing of physical access and unprepared for possible encounters  Damage includes leaking secret information, message contamination, node impersonation
  • 4. VULNERABILITIES OF MOBILE WIRELESS NETWORKS (CONTINUED)  Independent roaming could cause node to be captured, hijacked  Tracking is difficult in a global scale network  Lack of centralized authority creates new types of attacks to break the cooperative algorithms  Application and services can be a wink link  Attacks may target proxies or agents of base- station to mount DoS attacks
  • 5. SOLUTION?  Design a model for Intrusion Detection Techniques (IDS)  Deploy IDS into wireless networks  Keep the wireless networks secured from intrusions
  • 6. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 7. WHAT IS IDS  Intrusion: Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource  Intrusion detection: A detection technique that attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic.  The role of a IDS is passive, only gathering, identifying, logging and altering.
  • 8. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 9. TYPES OF IDS  Based on the type of audit data  Network-based IDS  Runs at the gateway of a network  Inspects packets that go through the network hardware interface  Host-based IDS  Runs on the operating system audit data  Monitors and analyzes events generated by programs or users
  • 10. TYPES OF IDS (CONTINUED)  Misuse detection system  Uses patterns of well known attacks or weak spots  Accurately detects instances of known attacks  Fails to detected newly invented attacks  Anomaly detection system  Observes activities that different from the established usage way  Does not require prior knowledge and detects new intrusion  Fails to describe the type of attack  May have high false positive rate
  • 11. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 12. PROBLEMS OF CURRENT IDS TECHNIQUES  Current IDS relies on real-time traffic analysis  Mobile ad hoc environment does not have switches, routers and gateway, where the IDS can be used to audit data  Mobile users may adopt new operations modes, so anomaly based IDS cannot be used in all cases
  • 13. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 14. IDS DESIGN ISSUES  To build an intrusion detection system that fits the feature of mobile ad-hoc networks  To chose the audit data sources appropriately  To design a model of activities that can separate anomaly from normalcy during attacks
  • 15. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 16. ARCHITECTURE FOR INTRUSION DETECTION  Intrusion detection and response system should be both distributed and cooperative  Every node in the mobile ad-hoc network participates in intrusion detection and response  Each node is responsible for detecting signs of intrusion locally and independently  Individual IDS agents are placed on each and every node  Each IDS agent monitors local activities
  • 18. ARCHITECTURE FOR INTRUSION DETECTION (CONTINUED)  Data collection module is responsible for gathering local audit traces  Local detection engine will use this data to detect local anomaly  Cooperative detection engines collaborates IDS agents
  • 19. ARCHITECTURE FOR INTRUSION DETECTION (CONTINUED)  Local response module triggers actions local to the node  Global response module coordinates actions among neighboring nodes  Secure communication module provides a high-confidence communication channel among IDS agents
  • 20. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 21. ANOMALY DETECTION IN MOBILE AD-HOC NETWORKS  Differentiate normal behavior from abnormal behavior  Uses information-theoretic technique to describe the characteristics of information flow  Uses classification algorithms to build anomaly detection models
  • 22. ANOMALY DETECTION IN MOBILE AD-HOC NETWORKS (CONTINUED)  Procedure for anomaly detection  Select audit data so that the normal dataset has low entropy  Perform appropriate data transformation according to the entropy measures (for information gain)  Compute classifier using training data  Apply the classifier to test data  Post-process alarms to produce intrusion reports
  • 23. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 24. EXPERIMENTAL RESULTS  Used three specific ad-hoc wireless protocols  DSR  AODV  DSDV  The feature set reflects information from different sources such as traffic pattern, routing change, topological movement  Built models using two classification algorithms  RIPPER (induction based classifier)  SVM_Light  Five different test scripts were used to generate traces
  • 25. EXPERIMENTAL RESULTS (CONTINUED)  Experiment suggested that DSR and AODV are better for anomaly detection.  Works better where degree of path and pattern redundancy exists  High correlation among changes of three types of information is proffered:  Traffic flow  Routing activities  Topological patterns
  • 26. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 27. CONCLUSION  Architecture for better intrusion detection in mobile computing environment should be distributed and cooperative.  On demand protocols are work better than table driven protocols because the behavior of on- demand protocols reflects the correlation between traffic pattern and routing message flows
  • 28. QUESTIONS?  Location-Aided Routing protocol may be more advantageous – why?  Why the alarm rate is much higher if the model is classified using values from another mobility level?