SlideShare ist ein Scribd-Unternehmen logo
1 von 28
INTRUSION DETECTION TECHNIQUES
FOR MOBILE WIRELESS NETWORKS
Y Zhang, W Lee & Y Huang


Presenter: Tanzir Musabbir
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
VULNERABILITIES OF MOBILE WIRELESS
NETWORKS

 The wireless networks and mobile computing has
  developed rapidly in the last decade
 Traditional way of protecting networks is no longer
  sufficient
 Use of wireless links increases attacks ranging from
  passive eavesdropping to active interfering.
 Missing of physical access and unprepared for
  possible encounters
 Damage includes leaking secret information,
  message contamination, node impersonation
VULNERABILITIES OF MOBILE WIRELESS
NETWORKS (CONTINUED)

 Independent roaming could cause node to be
  captured, hijacked
 Tracking is difficult in a global scale network

 Lack of centralized authority creates new types of
  attacks to break the cooperative algorithms
 Application and services can be a wink link

 Attacks may target proxies or agents of base-
  station to mount DoS attacks
SOLUTION?
 Design a model for Intrusion Detection Techniques
  (IDS)
 Deploy IDS into wireless networks

 Keep the wireless networks secured from intrusions
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
WHAT IS IDS
 Intrusion: Any set of actions that attempt to
  compromise the integrity, confidentiality, or
  availability of a resource
 Intrusion detection: A detection technique that
  attempts to identify unauthorized, illicit, and
  anomalous behavior based solely on network
  traffic.
 The role of a IDS is passive, only gathering,
  identifying, logging and altering.
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
TYPES OF IDS
 Based on the type of audit data
 Network-based IDS
     Runs at the gateway of a network
     Inspects packets that go through the network hardware
      interface
   Host-based IDS
     Runs on the operating system audit data
     Monitors and analyzes events generated by programs
      or users
TYPES OF IDS (CONTINUED)
   Misuse detection system
     Uses patterns of well known attacks or weak spots
     Accurately detects instances of known attacks
     Fails to detected newly invented attacks

   Anomaly detection system
     Observes activities that different from the established
      usage way
     Does not require prior knowledge and detects new
      intrusion
     Fails to describe the type of attack
     May have high false positive rate
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
PROBLEMS OF CURRENT IDS TECHNIQUES
 Current IDS relies on real-time traffic analysis
 Mobile ad hoc environment does not have switches,
  routers and gateway, where the IDS can be used to
  audit data
 Mobile users may adopt new operations modes, so
  anomaly based IDS cannot be used in all cases
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
IDS DESIGN ISSUES
 To build an intrusion detection system that fits the
  feature of mobile ad-hoc networks
 To chose the audit data sources appropriately

 To design a model of activities that can separate
  anomaly from normalcy during attacks
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
ARCHITECTURE FOR INTRUSION DETECTION
 Intrusion detection and response system should be
  both distributed and cooperative
 Every node in the mobile ad-hoc network
  participates in intrusion detection and response
 Each node is responsible for detecting signs of
  intrusion locally and independently
 Individual IDS agents are placed on each and every
  node
 Each IDS agent monitors local activities
ARCHITECTURE FOR INTRUSION DETECTION
ARCHITECTURE FOR INTRUSION DETECTION
(CONTINUED)
 Data collection module is
  responsible for gathering local
  audit traces
 Local detection engine will use
  this data to detect local
  anomaly
 Cooperative detection engines
  collaborates IDS agents
ARCHITECTURE FOR INTRUSION DETECTION
(CONTINUED)
 Local response module triggers
  actions local to the node
 Global response module
  coordinates actions among
  neighboring nodes
 Secure communication module
  provides a high-confidence
  communication channel among
  IDS agents
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
ANOMALY DETECTION IN MOBILE AD-HOC
NETWORKS
 Differentiate normal behavior from abnormal
  behavior
 Uses information-theoretic technique to describe
  the characteristics of information flow
 Uses classification algorithms to build anomaly
  detection models
ANOMALY DETECTION IN MOBILE AD-HOC
NETWORKS (CONTINUED)
   Procedure for anomaly detection
       Select audit data so that the normal dataset has low
        entropy
       Perform appropriate data transformation according to
        the entropy measures (for information gain)
       Compute classifier using training data
       Apply the classifier to test data
       Post-process alarms to produce intrusion reports
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
EXPERIMENTAL RESULTS
   Used three specific ad-hoc wireless protocols
     DSR
     AODV
     DSDV

 The feature set reflects information from different
  sources such as traffic pattern, routing change,
  topological movement
 Built models using two classification algorithms
     RIPPER (induction based classifier)
     SVM_Light

   Five different test scripts were used to generate
    traces
EXPERIMENTAL RESULTS (CONTINUED)
   Experiment suggested that DSR and AODV are
    better for anomaly detection.
       Works better where degree of path and pattern
        redundancy exists
   High correlation among changes of three types of
    information is proffered:
     Traffic flow
     Routing activities
     Topological patterns
OUTLINE
 Vulnerabilities of Mobile Wireless Networks
 What is IDS?

 Types of IDS

 Problems of current IDS techniques

 IDS design issues

 Architecture for Intrusion Detection

 Anomaly detection in Mobile Ad-Hoc Networks

 Experimental Results

 Conclusion
CONCLUSION
 Architecture for better intrusion detection in mobile
  computing environment should be distributed and
  cooperative.
 On demand protocols are work better than table
  driven protocols because the behavior of on-
  demand protocols reflects the correlation between
  traffic pattern and routing message flows
QUESTIONS?
 Location-Aided Routing protocol may be more
  advantageous – why?
 Why the alarm rate is much higher if the model is
  classified using values from another mobility level?

Weitere ähnliche Inhalte

Was ist angesagt?

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
UAV Network in IoT communication
UAV Network in IoT communicationUAV Network in IoT communication
UAV Network in IoT communicationpravesh kumar
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Gaurav Mittal
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile ComputingKABILESH RAMAR
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATMDr Rajiv Srivastava
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Recurrent neural networks rnn
Recurrent neural networks   rnnRecurrent neural networks   rnn
Recurrent neural networks rnnKuppusamy P
 
Activation functions
Activation functionsActivation functions
Activation functionsPRATEEK SAHU
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSGOWTHAMMS6
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 

Was ist angesagt? (20)

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
UAV Network in IoT communication
UAV Network in IoT communicationUAV Network in IoT communication
UAV Network in IoT communication
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)
 
Iot
IotIot
Iot
 
VANET in Mobile Computing
VANET in Mobile ComputingVANET in Mobile Computing
VANET in Mobile Computing
 
Topic : X.25, Frame relay and ATM
Topic :  X.25, Frame relay and ATMTopic :  X.25, Frame relay and ATM
Topic : X.25, Frame relay and ATM
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Recurrent neural networks rnn
Recurrent neural networks   rnnRecurrent neural networks   rnn
Recurrent neural networks rnn
 
IntServ & DiffServ
IntServ & DiffServIntServ & DiffServ
IntServ & DiffServ
 
Activation functions
Activation functionsActivation functions
Activation functions
 
EC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKSEC8551 COMMUNICATION NETWORKS
EC8551 COMMUNICATION NETWORKS
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 

Andere mochten auch

INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
 
Regional Center for the Arts
Regional Center for the ArtsRegional Center for the Arts
Regional Center for the Artsjlaposta
 
Blurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and EngineeringBlurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and Engineeringjlaposta
 
Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012lucasmpavelski
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion DetectionWei-Yu Chen
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersAmr Abed
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkVinayak Raja
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detectionCanSecWest
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
 
SEED PROCESSING PLANT
SEED PROCESSING PLANT SEED PROCESSING PLANT
SEED PROCESSING PLANT harryraj
 
1. seed & grain cleaning & grading
1. seed & grain cleaning & grading1. seed & grain cleaning & grading
1. seed & grain cleaning & gradingSANJEEV SAGAR
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION khanam22
 
Harmony search algorithm
Harmony search algorithmHarmony search algorithm
Harmony search algorithmAhmed Fouad Ali
 
Co-operative Societies
Co-operative SocietiesCo-operative Societies
Co-operative SocietiesNishant Nair
 

Andere mochten auch (20)

INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
 
Regional Center for the Arts
Regional Center for the ArtsRegional Center for the Arts
Regional Center for the Arts
 
Blurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and EngineeringBlurring The Boundaries; The University HS of Science and Engineering
Blurring The Boundaries; The University HS of Science and Engineering
 
Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012Harmony Search for Multi-objective Optimization - SBRN 2012
Harmony Search for Multi-objective Optimization - SBRN 2012
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Harmony search presentation
Harmony search presentationHarmony search presentation
Harmony search presentation
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Intrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux ContainersIntrusion Detection System for Applications using Linux Containers
Intrusion Detection System for Applications using Linux Containers
 
Intrusion detection in wireless sensor network
Intrusion detection in wireless sensor networkIntrusion detection in wireless sensor network
Intrusion detection in wireless sensor network
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
SEED PROCESSING PLANT
SEED PROCESSING PLANT SEED PROCESSING PLANT
SEED PROCESSING PLANT
 
1. seed & grain cleaning & grading
1. seed & grain cleaning & grading1. seed & grain cleaning & grading
1. seed & grain cleaning & grading
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION PPT on BRAIN TUMOR detection in MRI images based on  IMAGE SEGMENTATION
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
 
Harmony search algorithm
Harmony search algorithmHarmony search algorithm
Harmony search algorithm
 
Co-operative Societies
Co-operative SocietiesCo-operative Societies
Co-operative Societies
 
Cooperative Society
Cooperative SocietyCooperative Society
Cooperative Society
 
Amul case study
Amul case studyAmul case study
Amul case study
 

Ähnlich wie Intrusion Detection Techniques for Mobile Wireless Networks

A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detectionmtamilpriya
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...ijcsa
 

Ähnlich wie Intrusion Detection Techniques for Mobile Wireless Networks (20)

A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...A secure intrusion detection system against ddos attack in wireless mobile ad...
A secure intrusion detection system against ddos attack in wireless mobile ad...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Comparison of network intrusion detection
Comparison of network intrusion detectionComparison of network intrusion detection
Comparison of network intrusion detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...NTRUSION  D ETECTION  S YSTEMS IN  M OBILE  A D  H OC  N ETWORKS : S TATE OF ...
NTRUSION D ETECTION S YSTEMS IN M OBILE A D H OC N ETWORKS : S TATE OF ...
 

Intrusion Detection Techniques for Mobile Wireless Networks

  • 1. INTRUSION DETECTION TECHNIQUES FOR MOBILE WIRELESS NETWORKS Y Zhang, W Lee & Y Huang Presenter: Tanzir Musabbir
  • 2. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 3. VULNERABILITIES OF MOBILE WIRELESS NETWORKS  The wireless networks and mobile computing has developed rapidly in the last decade  Traditional way of protecting networks is no longer sufficient  Use of wireless links increases attacks ranging from passive eavesdropping to active interfering.  Missing of physical access and unprepared for possible encounters  Damage includes leaking secret information, message contamination, node impersonation
  • 4. VULNERABILITIES OF MOBILE WIRELESS NETWORKS (CONTINUED)  Independent roaming could cause node to be captured, hijacked  Tracking is difficult in a global scale network  Lack of centralized authority creates new types of attacks to break the cooperative algorithms  Application and services can be a wink link  Attacks may target proxies or agents of base- station to mount DoS attacks
  • 5. SOLUTION?  Design a model for Intrusion Detection Techniques (IDS)  Deploy IDS into wireless networks  Keep the wireless networks secured from intrusions
  • 6. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 7. WHAT IS IDS  Intrusion: Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource  Intrusion detection: A detection technique that attempts to identify unauthorized, illicit, and anomalous behavior based solely on network traffic.  The role of a IDS is passive, only gathering, identifying, logging and altering.
  • 8. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 9. TYPES OF IDS  Based on the type of audit data  Network-based IDS  Runs at the gateway of a network  Inspects packets that go through the network hardware interface  Host-based IDS  Runs on the operating system audit data  Monitors and analyzes events generated by programs or users
  • 10. TYPES OF IDS (CONTINUED)  Misuse detection system  Uses patterns of well known attacks or weak spots  Accurately detects instances of known attacks  Fails to detected newly invented attacks  Anomaly detection system  Observes activities that different from the established usage way  Does not require prior knowledge and detects new intrusion  Fails to describe the type of attack  May have high false positive rate
  • 11. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 12. PROBLEMS OF CURRENT IDS TECHNIQUES  Current IDS relies on real-time traffic analysis  Mobile ad hoc environment does not have switches, routers and gateway, where the IDS can be used to audit data  Mobile users may adopt new operations modes, so anomaly based IDS cannot be used in all cases
  • 13. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 14. IDS DESIGN ISSUES  To build an intrusion detection system that fits the feature of mobile ad-hoc networks  To chose the audit data sources appropriately  To design a model of activities that can separate anomaly from normalcy during attacks
  • 15. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 16. ARCHITECTURE FOR INTRUSION DETECTION  Intrusion detection and response system should be both distributed and cooperative  Every node in the mobile ad-hoc network participates in intrusion detection and response  Each node is responsible for detecting signs of intrusion locally and independently  Individual IDS agents are placed on each and every node  Each IDS agent monitors local activities
  • 18. ARCHITECTURE FOR INTRUSION DETECTION (CONTINUED)  Data collection module is responsible for gathering local audit traces  Local detection engine will use this data to detect local anomaly  Cooperative detection engines collaborates IDS agents
  • 19. ARCHITECTURE FOR INTRUSION DETECTION (CONTINUED)  Local response module triggers actions local to the node  Global response module coordinates actions among neighboring nodes  Secure communication module provides a high-confidence communication channel among IDS agents
  • 20. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 21. ANOMALY DETECTION IN MOBILE AD-HOC NETWORKS  Differentiate normal behavior from abnormal behavior  Uses information-theoretic technique to describe the characteristics of information flow  Uses classification algorithms to build anomaly detection models
  • 22. ANOMALY DETECTION IN MOBILE AD-HOC NETWORKS (CONTINUED)  Procedure for anomaly detection  Select audit data so that the normal dataset has low entropy  Perform appropriate data transformation according to the entropy measures (for information gain)  Compute classifier using training data  Apply the classifier to test data  Post-process alarms to produce intrusion reports
  • 23. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 24. EXPERIMENTAL RESULTS  Used three specific ad-hoc wireless protocols  DSR  AODV  DSDV  The feature set reflects information from different sources such as traffic pattern, routing change, topological movement  Built models using two classification algorithms  RIPPER (induction based classifier)  SVM_Light  Five different test scripts were used to generate traces
  • 25. EXPERIMENTAL RESULTS (CONTINUED)  Experiment suggested that DSR and AODV are better for anomaly detection.  Works better where degree of path and pattern redundancy exists  High correlation among changes of three types of information is proffered:  Traffic flow  Routing activities  Topological patterns
  • 26. OUTLINE  Vulnerabilities of Mobile Wireless Networks  What is IDS?  Types of IDS  Problems of current IDS techniques  IDS design issues  Architecture for Intrusion Detection  Anomaly detection in Mobile Ad-Hoc Networks  Experimental Results  Conclusion
  • 27. CONCLUSION  Architecture for better intrusion detection in mobile computing environment should be distributed and cooperative.  On demand protocols are work better than table driven protocols because the behavior of on- demand protocols reflects the correlation between traffic pattern and routing message flows
  • 28. QUESTIONS?  Location-Aided Routing protocol may be more advantageous – why?  Why the alarm rate is much higher if the model is classified using values from another mobility level?