CS 685-002: Security in Mobile Computing Systems Term Paper
CS 685-002: Security in Mobile Computing Systems Term Paper
TERM PAPER
by
Aparna Vattikonda
Ranjit Kumar Gampa
Vishnu Karunya Isukapalli
Viswanadha Raju Kakarlapudi
Contents
1. INTRODUCTION .......…………………. 1
1
4.1 Expert Systems …………………………….14
2
8.1.4.2 Over-the-air phone activation with key
exchange
Conclusions
References
3
ABSTRACT
Many intrusion detection techniques have been developed on fixed wired networks
but have been turned to be inapplicable in this new environment. We need to search for
new architecture and mechanisms to protect wireless networks and mobile computing
application.
In this paper, we examine the vulnerabilities of wireless networks and say that we
must include intrusion detection in the security architecture for mobile computing
environment. We have showed such architecture and evaluated key mechanisms in this
architecture such as applying mobile agents to intrusion detection, anomaly detection and
misuse detection for mobile ad-hoc networks.
4
1. INTRODUCTION
In the last three years, the networking revolution has finally come of age. More
than ever before, we see that the Internet is changing computing, as we know it. The
possibilities and opportunities are limitless; unfortunately, so too are the risks and
chances of malicious intrusions.
Dependability
Confidentiality: Transforming data such that only authorized parties can decode it.
5
Authentication: Proving or disproving someone’s or something’s claimed identity.
Integrity checking: Ensuring that data cannot be modified without such modification
. being detectable
Non – repudiation: Proving that a source of some data did in fact send data that he
might later deny sending
Information Information
Source Destination
a) Normal Flow
b) Interruption c) Interception
6
d) Modification e) Fabrication
Firstly, the use of wireless links renders the network susceptible to attacks ranging
from passive eavesdropping to active interfering as attacks on these links can from any
direction and target at any node. This means that a wireless ad-hoc network will not have
a clear line of defense, and every node has to be prepared for encounters with an
adversary directly or indirectly.
Secondly, mobile nodes are autonomous units that are capable of roaming
independently. Since tracking down a particular mobile node in a global scale network
cannot be done easily, attacks by compromised node from within the network are more
damaging and harder to detect.
7
A computer system should provide confidentiality, integrity and assurance against
denial of service. However, due to increased connectivity (especially on the Internet), and
the vast spectrum of financial possibilities that are opening up, more and more systems
are subject to attack by intruders. These subversion attempts try to exploit flaws in the
operating system as well as in application programs and have resulted in spectacular
incidents like the Internet Worm incident of 1988.
There are two ways to handle subversion attempts. One way is to prevent
subversion itself by building a completely secure system. We could, for example, require
all users to identify and authenticate themselves; we could protect data by various
cryptographic methods and very tight access control mechanisms. However this is not
really feasible because:
The history of security research has taught us a valuable lesson – no matter how
many intrusion prevention measures are inserted in a network, there are always some
weak links that one could exploit to break in.
We thus see that we are stuck with systems that have vulnerabilities for a while to
come. If there are attacks on a system, we would like to detect them as soon as possible
(preferably in real-time) and take appropriate action. This is essentially what an Intrusion
Detection System (IDS) does. An IDS does not usually take preventive measures when an
attack is detected; it is a reactive rather than pro-active agent. It plays the role of an
informant rather than a police officer.
8
In the last three years, the networking revolution has finally come of age. More
than ever before, we see that the Internet is changing computing, as we know it. The
possibilities and opportunities are limitless; unfortunately, so too are the risks and
chances of malicious intrusions.
A simple firewall can no longer provide enough security as in the past. Today's
corporations are drafting intricate security policies whose enforcement requires the use of
multiple systems, both proactive and reactive (and often multi-layered and highly
redundant). The premise behind intrusion detection systems is simple: Deploy a set of
agents to inspect network traffic and look for the “signatures” of known network attacks.
However, the evolution of network computing and the awesome availability of the
Internet have complicated this concept somewhat. With the advent of Distributed Denial
of Service (DDOS) attacks, which are often launched from hundreds of separate sources,
the traffic source no longer provides reliable temporal clues that an attack is in progress.
Worse yet, the task of responding to such attacks is further complicated by the diversity
of the source systems, and especially by the geographically distributed nature of most
attacks.
9
2.2 IDS REQUIREMENTS
At least one past effort has identified desirable characteristics for an IDS.
Regardless on what mechanisms an IDS is based, it must do the following:
We have developed a similar set of requirements along two themes: functional and
performance requirements.
The IDS must supply enough information to repair the system, determine the
extent of damage, and establish responsibility for the intrusion.
The IDS should be modular and configurable as each host and network segment
will require their own tests and these tests will need to be continuously upgraded
and eventually replaced with new tests.
Since the IDS is assigned the critical role of monitoring the security state of the
network, the IDS itself is a primary target of attack. The IDS must be able to
operate in a hostile computing environment and exhibit a high degree of fault-
tolerance and allow for graceful degradation.
Anomaly detection systems should have a very low false alarm rate. Given the
projected increase in network connectivity and traffic, simply decreasing the
10
percentage of overall false alarms may not be sufficient as their absolute number
may continue to rise.
The IDS should be able to learn from past experiences and improve its detection
capabilities over time. A self-tuning IDS will be able to learning from false alarms
with the guidance of system administrators and eventually on its own.
The IDS should be able to be easily and frequently updated with attack
signatures as new security advisories and security patches become available and
new vulnerabilities and attacks are discovered.
The IDS should be able to perform data fusion and be able to process information
from multiple and distributed data sources such as firewalls, routers, and switches.
As real-time detection demands push networked-based solutions to re-
programmable hardware devices that can download new capabilities, the IDS will
need to be able to communicate with the hardware-based devices.
Data reduction tools will be necessary to help the IDS process the information
gathered from data fusion techniques. Data mining tools will be helpful in running
statistical analysis tools on archived data in support of anomaly detection
techniques.
The ability to detect and react to distributed and coordinated attacks will
become necessary. Coordinated attacks against a network will be able to marshal
greater forces and launch many more and varied attacks against a single target.
These attacks can be permutations of known attacks, be rapidly evolving, and be
launched at little cost to the attackers.
The IDS should be able to work with other Commercial Off-the-Shelf (COTS)
security tools, as no vendor toolset is likely to excel in or to provide complete
11
coverage of the detection, diagnosis, and response responsibilities. The IDS
framework should be able to integrate various data reduction, forensic, host-
based, and network-based security tools. Interoperability and conformance to
standards will further increase the value of the IDS.
IDS data often requires additional analysis to assess any damage to the network
after an intrusion has been detected. Although the anomalous event was the first
detected, it may not be the first attempt to gain unauthorized access to the
network. Post event analysis will be needed to identify compromised machines
before the network can be restored to a safe condition.
The IDS itself must also be designed with security in mind. For example, the IDS
must be able to authenticate the administrator, audit administrator actions,
mutually authenticate IDS devices, protect the IDS data, and not create additional
vulnerabilities.
An IDS that is functionally correct, but that detects attacks too slowly is of little
use. Thus we must enumerate several performance requirements for IDSs. The IDS
performance requirements include:
The IDS must not place undue burden or interfere with the normal operations
for which the systems were bought and deployed to begin with. This requirement
makes it necessary for the agents to be cognizant of the consumption of network
resources for which they are competing.
The IDS must be scalable. As new computing devices are added to the network,
the IDS must be able to handle the additional computational and communication
load.
We can divide the techniques of intrusion detection into two main types.
12
Anomaly detection techniques assume that all intrusive activities are necessarily
anomalous. This means that if we could establish a "normal activity profile" for a system,
we could, in theory, flag all system states varying from the established profile by
statistically significant amounts as intrusion attempts. However, if we consider that the
set of intrusive activities only intersects the set of anomalous activities instead of being
exactly the same, we find a couple of interesting possibilities: (1) Anomalous activities
that are not intrusive are flagged as intrusive. (2) Intrusive activities that are not
anomalous result in false negatives (events are not flagged intrusive, though they actually
are). This is a dangerous problem, and is far more serious than the problem of false
positives.
The main issues in anomaly detection systems thus become the selection of
threshold levels so that neither of the above 2 problems is unreasonably magnified, and
the selection of features to monitor. Anomaly detection systems are also computationally
expensive because of the overhead of keeping track of, and possibly updating several
system profile metrics. Some systems based on this technique are discussed in Section 4
while a block diagram of a typical anomaly detection system is shown in Figure below.
The concept behind misuse detection schemes is that there are ways to represent
attacks in the form of a pattern or a signature so that even variations of the same attack
can be detected. This means that these systems are not unlike virus detection systems --
they can detect many or all known attack patterns, but they are of little use for as yet
unknown attack methods. An interesting point to note is that anomaly detection systems
try to detect the complement of "bad" behavior. Misuse detection systems try to
recognize known "bad" behavior. The main issues in misuse detection systems are how to
write a signature that encompasses all possible variations of the pertinent attack, and how
to write signatures that do not also match non-intrusive activity. A block diagram of a
typical misuse detection system is shown in Figure below.
13
Advantages:
Disadvantages:
Inspecting each packet on the wire is becoming increasingly more difficult with
the recent advances in network and wireless technology in terms of complexity
and speed.
Most intrusion detection systems employ a combination of both techniques, and
are often deployed on the network, on a specific host, or even on an application
within a host.
The most obvious location for an intrusion detection system is right on the
segment being monitored. Network-based intrusion detectors insert themselves in the
network just like any other device, except they promiscuously examine every packet they
see on the wire.
Advantage:
Disadvantage:
Truly shared segments are rare nowadays, which means a single sniffer cannot be
relied to monitor an entire subnet. Instead, detection systems must be integrated in
the port of Ethernet switches (the ones that have visibility into all packets on the
wire), which is not always feasible, even if such a port is available.
The fact that a single intrusion detection system is servicing the entire segment
makes it an easy target for a DoS attack. Such a system should not contain any
user accounts other than the privileged (root/Administrator) user; host any
unnecessary network services; offer any sort of interactive network access
(console access only); or be hosted on an obscure, proprietary operating system.
14
2.6 Host Based Intrusion Detection
Advantage:
Disadvantage:
Not all is well in the world of host-based intrusion detection, however: Since
these systems are closely tied to the operating system, they become yet one more
application to maintain and migrate. This is a critical point in an environment where
operating system levels are upgraded often, as the intrusion detection system must be
kept up to date for it to work efficiently. Also, deploying host-based detectors alone will
not protect your enterprise against basic, Network-layer DoS attacks (SYN flooding, ping
of death, land attack, and so on). These limitations withstanding, host-based detection
should be an integral part of your overall intrusion defense.
There have been a few approaches to anomaly intrusion detection systems, some
of which are described below.
In this method, initially, behavior profiles for subjects are generated. As the
system continues running, the anomaly detector constantly generates the variance of the
present profile from the original one. We note that, in this case, there may be several
measures that affect the behavior profile, like activity measures, CPU time used, number
of network connections in a time period, etc. In some systems, the current profile and the
previous profile are merged at intervals, but in some other systems profile generation is a
one time activity.
15
Advantages:
The main advantage to statistical systems is that they adaptively learn the
behavior of users; they are thus potentially more sensitive than human experts.
Disadvantages:
This method of intrusion detection tries to predict future events based on the
events that have already occurred. Therefore, we could have a rule
This would mean that given that events E1 and E2 have occurred, with E2
occurring after E1, there is an 80% probability that event E3 will follow, a 15% chance
that event E4 will follow and a 5% probability that event E5 will follow.
Problem:
The problem with this is that some intrusion scenarios that are not described by
the rules will not be flagged intrusive. Thus, if an event sequence A - B - C exists that is
intrusive, but not listed in the rule base, it will be classified as unrecognized.
Solution:
The above problem can be partially solved by flagging any unknown events as
intrusions (increasing the probability of false positives), or by flagging them as non-
16
intrusive (thus increasing the probability of false negatives). In the normal case, however,
an event is flagged intrusive if the left hand side of a rule is matched, but the right hand
side is statistically very deviant from the prediction.
Advantages:
First, rule based sequential patterns can detect anomalous activities that were
difficult with traditional methods.
Second, systems built using this model are highly adaptive to changes. This is
because low quality patterns are continuously eliminated, finally leaving the
higher quality patterns behind.
Third, it is easier to detect users who try to train the system during its learning
period.
And fourth, anomalous activities can be detected and reported within seconds of
receiving audit events.
Advantages:
Their success does not depend on any statistical assumption about the nature of
the underlying data.
Disadvantages:
17
However, they have some disadvantages:
First, a small window will result in false positives while a large window will
result in irrelevant data as well as increase the chance of false negatives.
Second, the net topology is only determined after considerable trial and error.
The intruder can train the net during its learning phase.
There has been significant research in misuse detection systems in the recent past.
Some of these systems are explained in depth in this section.
These systems are modeled in such a way as to separate the rule matching phase
from the action phase. The matching is done according to audit trail events. IDES follows
a hybrid intrusion detection technique consisting of a misuse detection component as well
as an anomaly detection component. The anomaly detector is based on the statistical
approach, and it flags events as intrusive if they are largely deviant from the expected
behavior. To do this, it builds user profiles based on many different criteria (more than 30
criteria, including CPU and I/O usage, commands used, local network activity, system
errors etc.). These profiles are updated at periodic intervals. The expert system misuse
detection component encodes known intrusion scenarios and attack patterns (bugs in old
versions of send mail could be one vulnerability). The rule database can be changed for
different systems.
Advantages:
One advantage of the IDES approach is that it has a statistical component as well
as an expert system component. This means that the chances of one system
catching intrusions missed by the other increase.
Another advantage is the problem's control reasoning is cleanly separated from
the formulation of the solution.
Disadvantages:
There are some drawbacks to the expert system approach too. For example, the
expert system has to be formulated by a security professional and thus the system
is only as strong as the security personnel who program it. This means that there
is a real chance that expert systems can fail to flag intrusions.
18
It is for the above reason that IDES has an anomaly as well as a misuse detection
component. These two components are loosely coupled in the sense that they perform
their operations independently for the most part. The IDES system runs on a machine
different from the machine(s) to be monitored, which could be unreasonable overhead.
Furthermore, additions and deletions of rules from the rule-base must take into account
the inter-dependencies between different rules in the rule-base. And there is no
recognition of the sequential ordering of data, because the various conditions that make
up a rule are not recognized to be ordered.
This is a very simple technique that monitors keystrokes for attack patterns.
Unfortunately the system has several defects -- features of shells like bash, ksh, and tcsh
in which user definable aliases are present defeat the technique unless alias expansion
and semantic analysis of the commands is taken up. The method also does not analyze the
running of a program, only the keystrokes. This means that a malicious program cannot
be flagged for intrusive activities. Operating systems do not offer much support for
keystroke capturing, so the keystroke monitor should have a hook that analyses
keystrokes before sending them on to their intended receiver. An improvement to this
would be to monitor system calls by application programs as well, so that an analysis of
the program's execution is possible.
States that certain scenarios are inferred by certain other observable activities. If
these activities are monitored, it is possible to find intrusion attempts by looking at
activities that infer a certain intrusion scenario. The model-based scheme consists of three
important modules. The anticipator uses the active models and the scenario models to try
to predict the next step in the scenario that is expected to occur. A scenario model is a
knowledge base with specifications of intrusion scenarios. The planner then translates
this hypothesis into a format that shows the behavior, as it would occur in the audit trail.
It uses the predicted information to plan what to search for next. The interpreter then
searches for this data in the audit trail. The system proceeds this way, accumulating more
and more evidence for an intrusion attempt until a threshold is crossed; at this point, it
signals an intrusion attempt.
This is a very clean approach. Because the planner and the interpreter know what
they are searching for at each step, the large amounts of noise present in audit data can be
filtered, leading to excellent performance improvements. In addition, the system can
predict the attacker's next move based on the intrusion model. These predictions can be
used to verify an intrusion hypothesis, to take preventive measures, or to determine what
data to look for next.
However, there are some critical issues related to this system. First, patterns for
intrusion scenarios must be easily recognized. Second, patterns must always occur in the
19
behavior being looked for. And finally, patterns must be distinguishing; they must not be
associated with any other normal behavior.
Intrusion detection for traditional, wired networks has been the topic of significant
research over the past few years. A problem arises, however, when taking the research for
wired networks and directly applying it to wireless networks. Key assumptions are made
when designing IDS s for wired networks, such as the difficulty for an attacker to
penetrate the physical security of the system, the amount of network bandwidth available
to the IDS, etc. Specific problems faced when building IDS for a mobile network are
addressed below:
B. Bandwidth Issues
Distinguishing an anomaly from normalcy has always been somewhat difficult for
wired IDS s and wireless IDS s are no different. If nodes in a network receive false or old
routing information from a particular node then it is difficult to verify if that particular
node has been compromised or not. An attacker could have taken the control of the node
to send false information to other nodes in the network, or the node could just be
temporarily out of sync due to fast movement or other processing requirements.
20
It is likely that in a wireless network there will have to be portions of the IDS
running on each individual node in the network. Each of these IDS agents will have to
communicate with other IDS agents in the network to convey information relating to the
status of the system. It is crucial that the information being passed from agent to agent be
encrypted as to not allow an attacker to gain access to the communication.
The lack of centralized audit points in ad hoc networks present difficult problems
for intrusion detection. Most static, wired networks have specific repositories where the
IDS can obtain audit data for its misuse and anomaly detection( e.g. switches, routers,
gateways, etc.). Without centralized audit points, IDS s on ad hoc networks are limited to
use only the current traffic coming in and out of the node as audit data. The algorithms
that the IDS uses must be distributed, and take into account the fact that a node can only
see a portion of the network traffic.
Since ad hoc networks are dynamic and nodes can move about freely, there is a
possibility that one or more nodes could be captured and compromised, especially if the
21
Mobile networks do not communicate as frequently as their wired counterparts.
Bandwidth issues, and other issues such as battery life, contribute to this factor. This lack
of communication can become a problem for IDS s attempting to define rules of
normality for anomaly detection. If only a small amount of data is available to establish
normal activity association rules, it is very hard to distinguish an attack from regular
network use.
What is a good system architecture for building intrusion detection and response
systems that fits the features of mobile ad-hoc networks?
What are the appropriate audit data sources? How do we detect anomaly based on
partial, local audit traces – if they are the only reliable audit source?
6. NEW ARCHITECTURE
The architecture addressed is a distributed IDS, where each node on the network
will have an IDS agent running on it. The IDS agents on each node in the network work
together via a cooperative intrusion detection algorithm to decide when and how the
network is being attacked.
The architecture is divided into parts: the Mobile IDS Agents, which reside on
each node in the network, and the Stationary Secure Database, which contains global
signatures of known misuse attacks and stores patterns of each users normal activity in a
non-hostile environment.
22
A. Mobile IDS Agents
Each node in the network will have an IDS agent running on it all times. This
agent is responsible for detecting intrusions based on local audit data and participating in
cooperative algorithms with other IDS agents to decide if the network is being attacked.
Each agent has five parts : the Local Audit Trial, the Local Intrusion Database ( LID ),
the Secure Communication Module, the Anomaly Detection Modules ( ADM s), and the
Misuse Detection Modules ( MDM s).
Each agent must constantly check the audit data to decide that an intrusion is not
taking place. The Local Audit Trial will consist of specific items out of the network
traffic as well as user commands to the node. The Local Audit Trial is responsible for
selecting only the items it needs out of the network traffic and system audit data in order
to minimize the size of the audit data collected.
A audit data is collected by the Local Audit Trial, it is passed to the Misuse
Detection Modules and the Anomaly Detection Modules for further analysis. The Local
Audit Trial is only responsible for gathering and storing audit data, not processing it.
The LID is a local database that warehouses all information necessary for the IDS
agent, such as the signature files of known attacks, the established patterns of users on the
23
network, and the normal traffic flow of the network. The Anomaly Detection Modules
and Misuse Detection Modules communicate directly with the LID to determine if an
intrusion is taking place.
24
and does not communicate any other type of information between nodes. It must share
the bandwidth that the mobile device uses for normal data transmission, so it is required
to be efficient, and can only use the amount of bandwidth in needs.
Also, the Secure Communication module must process information coming to the IDS
agent from other agents in the network. For this reason, it must be fast and efficient, so as
not to take away from the processing time of the mobile unit.
If an ADM can identify an anomaly based solely on the data in the Local
Intrusion database, then it can initiate a local and global response to the intrusion. An
example of a local response could be to shut down the node, rendering it useless to an
attacker. A possible global response would be to use the Secure Communication Module
to alert other IDS agents, allowing them to reconstitute a network while excluding the
compromised node.
If the amount of data in the Local Intrusion database is not sufficient to determine
if the present activity should be classified as an intrusion, then it is possible for the ADM
to use the Secure Communication module to query other nodes in the network to get help
in identifying an intrusion.
The Misuse Detection Modules functions similarly to the ADM s on the IDS
agent. The primary difference is that MDM s only identify known patterns of attacks that
are specified in the Local Intrusion Database. Like the ADM s, if the audit data available
locally is enough to determine if an intrusion is taking place, the proper response can be
initiated. It is also possible for a MDM to use a cooperative algorithm to identify an
intrusion. If a MDM needs more information from other IDS agents on other nodes, it
would be expected to use the Secure Communication module to interact with them. Using
the information given by other IDS agents, the MDM might be able to predict an
intrusion with more accuracy.
25
The Stationary Secure Database ( SSD ) in this architecture acts as a secure,
trusted repository for mobile nodes to obtain information about the latest misuse
signatures and to find the latest patterns of normal user activity. It is assumed that the
attacker will not compromise the Stationary Secure Database, as it stored in area of high
security. To ensure that the SSD will not be compromised it is kept stationary and not
placed in a hostile environment where attacker attack is likely. It is also assumed that no
physically compromised node will come in contact with the SSD, since the attacker will
not be given physical access to the area where the SSD resides. Although these are severe
restrictions, they can be accommodated through operational procedures and physical
security.
The mobile IDS agents will collect and store audit data ( such as user commands,
network traffic, etc.) while in the field, and will transfer this information when it is
attached to the SSD. The SSD will then use this information for data mining of new
anomaly association rules. The use of the SSD to mine new anomaly rules is beneficial to
the IDS for three reasons. First, the SSD will be fixed, fast machine that is capable of
mining rules much faster than on slower, mobile nodes. Secondly, the processing time
used to mine the new rules of anomaly will not take away from the processing time of the
mobile nodes. The SSD puts the task of creating new rules for anomaly detection on the
wired server and away from the mobile nodes. And thirdly, the SSD is capable of having
much more storage capacity to store an abundance of audit data collected from the nodes.
It is very likely that the mobile nodes will not have enough storage to store substantial
amounts of audit data, but by uploading audit data to the SSD, no data is deleted because
of lack of storage space.
The SSD will also be the place where the system administrator can specify the
newest misuse signatures. When the IDS agents are connected to SSD, they will gain
access to the latest attack signatures automatically. This will make it much easier to
update all the nodes in the network to keep up with the latest attacks. Instead of manually
26
updating the attack files in the Local Intrusion Database of each individual node, or using
the Secure Communication device on each node to communicate the new signatures, the
SSD will be responsible for communicating the new attack signatures to each individual
IDS agent.
One of the best reasons for using the SSD to communicate the new attack
signatures, and establish new patterns of normalcy, is to limit the amount of
communication that must take place between IDS agents in the mobile ad hoc network.
As stated earlier, the IDS agents should not use very much bandwidth, because it is
limited and in use by other applications on the mobile node. The use of SSD allows the
IDS agents to not continually have to share information in order to update their Local
Intrusion Database. Communication between the SSD and the IDS agents will be very
quick and efficient, as there should be no threat of attack. By relying on the SSD to be a
trusted source of update information, the IDS agent no longer has to use cooperative
algorithms to determine if the information being sent is trustworthy or not.
It is feasible that the SSD have other functions besides updating the intrusion
detection information on each IDS agent, which could be a place where the mobile nodes
could charge their batteries while receiving the latest IDS information for example. This
way the time spent at the SSD would be more efficient and not be used for just intrusion
detection.
Despite the benefits of having a SSD in a mobile IDS architecture, there are few
disadvantages of relying on a stationary database to provide vital IDS information. If a
SSD is used, mobile nodes will have to be attached to the non-mobile database
periodically to stay up-to-date with the latest intrusion information. This may not be an
option for some mobile, ad hoc environments. Also, since the SSD must be a trusted
source, it cannot be taken onsite without significant risk. If a mobile IDS agent detects a
new intrusion while in a hostile environment, it cannot be attached to the SSD in order to
communicate the new attack patterns. And, even if it could, other nodes would be in the
hostile environment and would not be able to attach to the SSD right away to get the new
signature. However, these problems might be solved if the IDS agents can communicate
the new patterns of attack to each other via the Secure Communication module while in
the hostile environment. This way, only information that has to be communicated right
away will be sent over the wireless channels, and the less time sensitive information can
be gathered later at the SSD when time permits.
In this section we discuss how to build an anomaly detection models for wireless
networks. Detection based on activities in different network layers may differ in the
format and the amount of available audit data as well as the modeling algorithms.
7.1.1 Framework:
27
The basic premise for anomaly detection is that there is intrinsic and
observable characteristic of normal behavior that is distinct from that of abnormal
behavior. Entropy and conditional entropy are used to describe the characteristics of the
normal information flows and use the classification algorithms to build anomaly
detection models. We can use a classifier trained using normal data to predict what is
normally the next event given the previous n events. In monitoring when the actual event
is not what the classifier has predicted there is an anomaly. When constructing a classifier
features with high information gain are needed.
Using this frame work we employ the following the procedure for the anomaly detection.
a) Select or partition audit data so that the normal data set has low Entropy
b) Perform appropriate data transformation according to entropy measures
c) Compute classifier using training data.
d) Apply the classifier to test it.
e) Post process alarms to produce intrusion reports.
Traffic pattern distortion: This type of attacks changes default/normal traffic behavior:
(a) packet dropping; (b) packet generation with faked source address; (c) corruption on
packet contents; and (d) denial-of-service.
Audit Data: The two local data sources used for anomaly detection: (1) local routing
information, including cache entries and traffic statistics and (2) position locator, or GPS,
which we assume will not be compromised and can therefore reliably provide location
and velocity information of nodes within the whole neighborhood. We use only local
information because remote nodes can be compromised and their data
cannot be trusted.
28
In practice, we expect the feature set needs to be updated after certain period, as the
characteristics of routing behavior can change with time.
Post Processing: Given an execution trace, we first apply a detector to examine each
observation. Then a post-processing scheme is used to examine the predictions and
generate intrusion reports.
The two main areas where we need anomaly detection is ad-hoc networks is
Abnormal Updates to the routing table.
Abnormal activities in other layers.
The two most important factors that are required for the anomaly detection are
Low False positive rate (percentage of normalancy variations detected as anomalies)
High true positive rate (percentage of anomalies detected)
A routing table usually contains, at the minimum the next hop to each destination
node and the number of hops. The physical movement of nodes or network membership
changes causes a legitimate movement in the routing table. Our objective in this study is
to lead a better understanding of the important and challenging issues in intrusion
detection for ad-hoc routing protocols. First using a given set of training, testing and
evaluation scenarios, and modeling algorithms, we can identify which routing protocol ,
with potentially all its routing information used , can result in better performing detection
models.This will help Answer the question “what information should be included in the
routing table to make “intrusion detection effective”. This finding can be used in
designing more robust protocols.
Next, using a given routing protocol, we can explore the feature space and
algorithm space to find the best performing model. This will give the insight to the
general practices of building intrusion detection for wireless networks.
29
At the wireless application layer, the trace data can use the service as the class
(i.e., one class for each service), and can contain the following features: for the past s
seconds, the total number of requests to the same service, the number of different services
requested, the average duration of the service, the number of nodes that requested (any)
service, the total number of service errors, etc. A classifier on the trace data then
describes for each service the normal behaviors of its requests. Many attacks generate
different statistical patterns than normal requests. Since the features described above are
designed to capture the statistical behavior of the requests, the attacks, when examined
using the feature values, will have large deviations than the normal requests.
8. IMPLEMENTED APPROACHES
Following are the some of the intrusion detection techniques used in wireless and
ad hoc networks.
The MAC layer is common for all these layers. The IEEE 802.11 defines two
authentication schemes:
Shared key authentication uses a standard challenge and response along with a
shared secret key to provide authentication. The shared key Authentication requires that
the Wired Equivalent privacy protocol (WEP) Algorithm be implemented on both the
30
wireless terminal and the access point. The station wishing to authenticate, the initiator,
sends an authentication request management frame indicating that they wish to use
“shared key” authentication. The recipient of the authentication request, the responder,
responds by sending an authentication management frame containing challenge text to
the initiator. The challenge text is generated by using the WEP pseudo-random number
generator (PRNG) with the “shared secret” and a random initialization vector (IV)2 .
Once the initiator receives the management frame from the responder, they copy the
contents of the challenge text into a new management frame body. This new management
frame body is then encrypted with WEP using the “shared secret” along with a new IV
selected by the initiator. The encrypted management frame is then sent to the responder.
The responder decrypts the received frame and verifies that the 32-bit CRC integrity
check value (ICV) is valid, and that the challenge text matches that sent in the first
message. If they do, then authentication is successful. If the authentication is successful,
then the initiator and the responder switch roles and repeat the process to ensure mutual
Authentication.
Mobiles that are allowed to connect to the network use the same shared key, so this
authentication method is only able to verify if the particular mobile belongs to the group
allowed to connect to the network, but there is no way to distinguish one mobile from
another. Also there are no means available to authenticate the network. The IEEE 802.11
does not define any key management functions. The IEEE 802.11 defines an optional
WEP mechanism to implement the confidentiality and integrity of the traffic in the
network. WEP is used at the station-to-station level and does not offer any end-to-end
security. Using, say, the playback attack, could easily fool the Shared Key Authentication
scheme. Hence, anyway an additional authentication mechanism is needed.
The mobile systems have constraints like minimal computational capabilities and
authentication and the Secure key generation and distribution capability is required by
31
any system, which contains cryptographic authentication, confidentiality and
identification. Developing faster and more powerful hardware components, which require
less Energy and changing the algorithmic and protocol design of the current system
would be useful to meet the future needs.
8.1.4.1 Key generation by the telephone manufacturer and distribution to the Service
Provider via a backbone network.
Secure implementation:
Service Provider broadcasts public information together with the signature of the
C.A. (Certification Authority whose digital signature will certify the validity of a
S.P.) on that information. Mobile Unit Authenticates the Service Provider using the built-
in C.A. public key. Generate a random session key SK and a random authentication pad
AP. Encrypt (SK, AP) with Service Providers public key and send it to Service provider.
Service Provider decrypts the session key and authenticated pad sent by Mobile unit.
Generate a key (A-key) and encrypt it together with the authentication pad AP using a
secure symmetric encryption algorithm with the received session key SK. Mobile unit
decrypts the A-key and verify that its last bits are equal to the AP.
32
C.A
E({S.K,A.P},S.P’s Public Key)
E({A-Key,A.P},S.K}
I
Identification Signature
To make above system efficient for the practical purposes, we need to find an
efficient way to authenticate the Service Provider to the mobile agent and we need to find
a efficient public-key encryption method to transmit the session key fro mobile unit to
service provider.
Semantic Security ensures that no partial information about the session key can be
obtained, given the encryption and even if the attacker managed to guess the session key
sent by the mobile unit, he would be unable to verify it. Plain text awareness requires that
the attacker not only cannot obtain any advantage from choosing a random message, but
he is required to know the whole plain text.
33
In this section we present the watchdog and the pathrater tools for detecting and
mitigating routing misbehavior. We also describe the limitations of these methods
Watchdog detects misbehaving nodes. Suppose there exists a path from node S to
D through intermediate nodes A, B and C. Node A cannot transmit all the way to node C,
but it can listen in on node B’s traffic. Thus, when A transmits a packet for B to forward
to C, A can often tell if B transmits the packet. If encryption is not performed separately
for each link, which can be expensive, then A can also tell if B has tampered with the
payload or the header.
W
S A B C D
Every time a node fails to forward the packet, the watchdog increments the failure
tally. If the tally exceeds a certain threshold bandwidth, it determines that the node is
Misbehaving. The watchdog technique has advantages and weaknesses. DSR with the
watchdog has the advantage that it can detect misbehavior at the forwarding level and not
just the link level. Disadvantages with this technique is that it might not detect a
misbehaving go of a node in the presence of
Ambiguous Collisions
Receiver Collisions
Limited Transmission Power
False Misbehavior
Partial Dropping
S 2 A 1 B 1 C D
Fig 1 .Node A does not hear the B forwarding packet 1 to C ,because B’s transmission collides at A with
packet 2 from source S.
Pathrater:
Knowledge of misbehaving nodes with link reliability data to pick the route most
likely to be reliable. Each node maintains a rating for every other node it knows about in
the network. It calculates a path metric by averaging the node ratings in the path. We
34
choose this metric because it gives a comparison of the overall reliability of different
paths and allows pathrater to emulate the shortest length path algorithm when no
reliability information has been collected, as explained below. If there are multiple paths
to the same destination, we choose the path with the highest metric. Note that this differs
from standard DSR, which chooses the shortest path in the route cache. Further note that
since the pathrater depends on knowing the exact path a packet has traversed, it must be
implemented on top of a source routing protocol.
35
CONCLUSION
We have said that any secure network will have vulnerabilities that an adversary
could exploit. This is especially true for wireless ad-hoc networks. Intrusion Detection
can compliment intrusion prevention techniques (such as encryption, authentication,
secure MAC, secure routing, etc.) to improve the network security. However new
techniques must be developed to make intrusion detection work better for the wireless
networks.
Currently, the research is taking place in developing new architecture for wireless
networks for better security.
REFERENCES:
36
[1] Lidong Z., Zygmunt J. H., “Securing ad hoc networks”, IEEE Network, Vol. 13,
No. 6, 1999, pp. 24-30.
[3] Marti S., Giuli T.J., Lai K. Baker M., “Mitigating Routing Misbehavior in Mobile
Ad Hoc Networks”, Proceedings of the Annual International Conference on
Mobile Computing and Networking, MOBICOM 2000, pp 255-265.
[4] Arbaugh W., Shankar N., Wan Y.C.J., “Your 802.11 Wireless Network Has No
Clothes”, University of Maryland, 30-Mar-2001.
[5] Wenken Lee, Dong Xiang, Informatic-Theoritic Measures for Anomaly Detection .
[6] Wenken Lee, Yongguang Zhang, Yi-An Huang, Intrusion Detection Techniques for
Mobile wireless networks.
[7] Yongguang Z., Wenke L., “Intrusion Detection in Wireless Ad- Hoc Networks”,
Proceedings of the Annual International Conference on Mobile Computing and
Networking, MobiCom 2000, pp 275-283.
37