Chapter 2 Notes
Chapter 2 Notes
CHAPTER II-NOTES
INTRUSION DETECTION IN WIRELESS AD HOC NETWORKS
MANET Characteristics:
No fixed infrastructure
Dynamic changing topology
Mobile devices join/leave the network unexpectedly; they can also move freely
Energy-constrained
Limited bandwidth
Each node also serves as router
Help to relay packets received from neighbors
Interoperation with the Internet
-
Figure 1: Intrusion detection system (IDS) overview.
How Does an Intrusion Detection System Work? What Are Its Uses?
IDS solutions excel in monitoring network traffic and detecting anomalous
activity. They are placed at strategic locations across a network or on devices
themselves to analyze network traffic and recognize signs of a potential attack.
An IDS works by looking for the signature of known attack types or detecting
activity that deviates from a prescribed normal. It then alerts or reports these
anomalies and potentially malicious actions to administrators so they can be
examined at the application and protocol layers.
This enables organizations to detect the potential signs of an attack beginning or
being carried out by an attacker. IDS solutions do this through several
capabilities, including:
- False alarms: Also known as false positives, these leave IDS solutions
vulnerable to identifying potential threats that are not a true risk to the
organization. To avoid this, organizations must configure their IDS to
understand what normal looks like, and as a result, what should be
considered as malicious activity.
- False negatives: This is a bigger concern, as the IDS solution mistakes an
actual security threat for legitimate traffic. An attacker is allowed to pass into
the organization’s network, with IT and security teams oblivious to the fact
that their systems have been infiltrated.
2 .3 REQUIREMENTS OF IDS
An IDS comprises five core components that work together to detect, document, and deter
intrusions:
1. Sensors (Data Acquisition Units): These modules function as the primary
data collection mechanism for the IDS. They are deployed at strategic points
within the network (network sensors) or on individual hosts (host-based
Dr R DHAYA EE531-CHAPTER 2 NOTES (POST GRADUATE) Page 9
sensors). Network sensors continuously capture and transmit network
traffic data to the IDS for analysis. Host-based sensors monitor system
activity on the device, including logs, file access attempts, and running
processes.
2. Data Processing and Analysis Engine: The analysis engine is the core
component responsible for evaluating data collected by the sensors. It
employs various techniques to identify potential intrusions:
Signature-based Detection: This approach involves matching
captured data against a database of known attack signatures.
These signatures represent characteristic patterns of malicious
activity.
Anomaly Detection: This technique involves employing statistical
algorithms to establish baselines for normal network traffic or
system activity. The engine then identifies significant deviations
from these baselines as potential intrusions.
3. Alert Generation Engine: Upon detecting suspicious activity, the analysis
engine triggers the alert generation engine. This engine is responsible for
formulating alerts that include details of the suspected intrusion, such as
the type of activity detected, its timestamp, and the source IP address. These
alerts are then disseminated to:
- Security Personnel: For investigation and response actions.
- Security Information and Event Management (SIEM) System: A
central repository that aggregates security events from various sources,
including IDS alerts, to facilitate a comprehensive view of security posture.
4. Management Interface: This software component provides a user interface
for security administrators to interact with the IDS. It allows them to:
Misuse detection: In misuse detection, decisions are made on the basis of knowledge
of a model of the intrusive process and what traces it ought to leave in the observed
model of both the normal behavior of the system and the intrusive behaviorof
the intruder.
the normal traffic in the system. These detectors have a much better chance of
correctly detecting truly interesting events in the supervised system, since they
both know the patterns of intrusive behavior and can relate them to the normal
behavior of the system. They would at the veryleast be able to qualify their
decisions better.
A DISTRIBUTED IDS
- In this model, an IDS agent runs at eachmobile node, and performs local data
layer
agents placed oneach and every node run independently andmonitor local
- The local response module triggers actions local to this mobile node (e.g., an
IDS agentalerting the local user), while the global one coordinates actions
among neighboring nodes, such as the IDS agents in the network electing a
Ad hoc On-Demand Distance Vector (AODV) Routing Status of this Memo This
memo defines an Experimental Protocol for the Internet community.
AODV is one of the reactive routing protocols developed forMANET. AODV
builds routing tables on demand. When a sourcenode needs to establish a route
to a destination node, it broadcasts aroute request message (RREQ) to all its
neighbors. Eachintermediate node receiving a RREQ message checks its
routingtable for the requested route .
TIARA, that secure ad hoc networks againstDoS attacks. The TIARA approach
involvesfully distributed lightweight firewalls for ad hocwireless networks,
distributed traffic policingmechanisms, intrusion-tolerant routing, distributed
Dr R DHAYA EE531-CHAPTER 2 NOTES (POST GRADUATE) Page 27
intrusion detection mechanisms, flow monitoring,reconfiguration mechanisms,
multipathrouting, and source-initiated route switching. The flow-based route access
control (FRAC)rules define admissible flows. Per-flow securityassociation is
instantiated by secure sessionsetup signaling protocol and contains informationfor
packet authentication. Also, fast authenticationenables low-overhead integrity checks
onpacket flow-ids and sequence numbers. There isreferral-based resource allocation,
which limitsnetworks’ exposure to resource usurpation byspurious sessions, and
flows are assigned an initialallowable resource usage. Moreover, additionalresources
are only granted if the source ofthe flow can present referrals from a certainnumber of
trusted nodes. Referrals have timeboundvalidity. Flow-specific sequence numbers
limit and contain the impact of traffic replayattacks; sequence numbers are embedded
withinsecret locations within each packet. The destinationof flow monitors select flow
parameters todetect intrusion-induced path failures, and multipathrouting and
source-initiated route switchingdivert flow through available alternate paths
tocircumvent intruders. Efforts are on to implementdynamic on-the-fly modifications
to FRAC(firewall) policies, real-time referral-basedresource allocation, lightweight
implementationof traffic policing, fast authentication mechanismsresistant to traffic
analysis, and embeddingsequence numbers and path labels in encryptedpackets.
Although the proposed architectureseems to cover most of the important aspects
ofintrusion detection and prevention in MANETs,implementation of such a design
methodologyentails extensive modification of the routingalgorithms in a MANET. A
summary of countermeasuresused in TIARA against intrusionattacks is shown in
Table 1.