SlideShare a Scribd company logo
1 of 5
Download to read offline
Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1722-1726
  Manet Threat Alarming Based On System Statistics & Support
                      Vector Machine
                       Gajendra Singh Chandel 1 , Priyanka Murotia 2
   Department Of Information Technology , Sri Satya Sai Institute Of Science & Technology Sehore, Bhopal
                                              (M.P) , India 1,2


Abstract
          This paper presents a technique for                  As surveillance and early-warning tools, as the
network threat detection and alarming. The                     honeypots are not normally accessed for legitimate
network security is one of the most important                  purposes. Techniques used by the attackers that
aspects while designing a Computer Network; the                attempt to compromise these decoy resources are
robust Security mechanism is required especially               studied during and after an attack to keep an eye on
for the networks involving ecommerce &                         new exploitation techniques. Such analysis may be
confidential data. In this paper we presents a                 used to further tighten security of the actual network
statistical & classification approach to identify the          being protected by the honeypot [4].
attack. The proposed system takes system
statistics like types of packets, delay, drop rate,            2. BASICS OF THREAT DETECTION
buffer overflow etc. as input & returns the threat             SYSTEM
type (Blackhole, Wormhole, and Flooding etc.).                           A Threat detection system is a device or
                                                               software application that monitors network or system
Keywords- Machine Learning, Network Security,                  activities for malicious activities or policy violations
Security Threats, SVM (Support Vector Machine).                and produces reports to a Management Station [1].
                                                               Some systems may attempt to stop a Threat attempt
1. INTRODUCTION                                                but this is neither required nor expected of a
           Network security starts with authenticating         monitoring system. Threat detection and prevention
the user, commonly with a username and a password.             systems are primarily focused on identifying possible
Since this requires just one detail authenticating the         incidents, logging information about them, and
user name i.e. the password, which is something the            reporting attempts. In addition, organizations use
user 'knows' this is sometimes termed one-factor               threat detection systems for other purposes, such as
authentication. With two-factor authentication,                identifying problems with security policies,
something the user 'has' is also used (e.g. a security         documenting existing threats, and deterring
token or 'dongle', an ATM card, or a mobile phone);            individuals from violating security policies. Threat
and with three-factor authentication, something the            detection systems have become a necessary addition
user 'is' is also used (e.g. a fingerprint or retinal scan).   to the security infrastructure of nearly every
Once authenticated, a firewall enforces access                 organization.
policies such as what services are allowed to be                         Threat detection systems typically record
accessed by the network users [2]. Though effective            information related to observed events, notify
to prevent unauthorized access, this component may             security administrators of important observed events,
fail to check potentially harmful content such as              and produce reports. Many Threat detection systems
computer worms or Trojans being transmitted over               can also respond to a detected threat by attempting to
the network. Anti-virus software or intrusion                  prevent it from succeeding. They use several
prevention system (IPS)[3] help detect and inhibit the         response techniques, which involve the Threat
action of such malware. An anomaly-based intrusion             detection systems stopping the attack itself, changing
detection system may also monitor the network and              the security environment (e.g., reconfiguring a
traffic for unexpected (i.e. suspicious) content or            firewall), or changing the attack’s content.
behavior and other anomalies to protect resources,
e.g. from denial of service attacks or an employee              2.1. Threat Detection Techniques
accessing files at strange times. Individual events            2.1.1) Expert Systems: these work on a previously
occurring on the network may be logged for audit               defined set of rules describing an attack. All security
purposes and for later high-level analysis.                    related events incorporated in an audit trail are
Communication between two hosts using a network                translated in terms of if-then-else rules. Examples are
may be encrypted to maintainprivacy. Honeypots (a              Wisdom & Sense and Computer Watch (developed at
honeypot is a trap set to detect, deflect, or in some          AT&T).
manner counteract attempts at unauthorized use of              2.1.2) Signature Analysis: Similarly to expert System
information systems), essentially decoy network-               approach, this method is based on the attack
accessible resources, may be deployed in a network             knowledge. They transform the semantic description



                                                                                                      1722 | P a g e
Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1722-1726
of an attack into the appropriate audit trail format.     2.1.6) User Intention Identification: This technique
Thus, attack signatures can be found in logs or input     (that to our knowledge has only been used in the
data streams in a straightforward way. An attack          SECURENET project) models normal behavior of
scenario can be described, for example, as a sequence     users by the set of high-level tasks they have to
of audit events that a given attack generates or          perform on the system (in relation to the users’
patterns of searchable data that are captured in the      functions). These tasks are taken as series of actions,
audit trail. This method uses abstract equivalents of     which in turn are matched to the appropriate audit
audit trail data. Detection is accomplished by using      data. The analyzer keeps a set of tasks that are
common text string matching mechanisms. Typically,        acceptable for each user. Whenever a mismatch is
it is a very powerful technique and as such very often    encountered, an alarm is produced.
employed in commercial systems (for example               2.1.7) Machine learning: This is an artificial
Stalker, Real Secure, NetRanger, Emerald eXpert-          intelligence technique that stores the user-input
BSM).                                                     stream of commands in a vectorial form and is used
2.1.3) State-Transition Analysis: here, an attack is      as a reference of normal user behavior profile.
described with a set of goals and transitions that must   Profiles are then grouped in a library of user
be achieved by an intruder to compromise a system.        commands having certain common characteristics
Transitions are represented on state-transition           [3].
diagrams.                                                 2.1.8) Data Mining: generally refers to a set of
2.1.4) Statistical Analysis Approach: this is a           techniques that use the process of extracting
frequently used method (for example SECURENET).           previously unknown but potentially useful data from
The user or system behavior (set of attributes) is        large stores of data. Data mining method excels at
measured by a number of variables over time.              processing large system logs (audit data). However
Examples of such variables are: user login, logout,       they are less useful for stream analysis of network
number of files accessed in a period of time, usage of    traffic. One of the fundamental data mining
disk space, memory, CPU etc. The frequency of             techniques used in intrusion detection is associated
updating can vary from a few minutes to, for              with decision trees [3]. Decision tree models allow
example, one month. The system stores mean values         one to detect anomalies in large databases. Another
for each variable used for detecting exceeds that of a    technique refers to segmentation, allowing extraction
predefined threshold. Yet, this simple approach was       of patterns of unknown attacks [3]. This is done by
unable to match a typical user behavior model.            matching patterns extracted from a simple audit set
Approaches that relied on matching individual user        with those referred to warehoused unknown attacks
profiles with aggregated group variables also failed to   [3]. A typical data mining technique is associated
be efficient. Therefore, a more sophisticated model of    with finding association rules. It allows one to extract
user behavior has been developed using short- and         previously unknown knowledge on new attacks [3] or
long-term user profiles. These profiles are regularly     built on normal behavior patterns. Anomaly detection
updated to keep up with the changes in user               often generates false alarms. With data mining it is
behaviors. Statistical methods are often used in          easy to correlate data related to alarms with mined
implementations of normal user behavior profile-          audit data, thereby considerably reducing the rate of
based Intrusion Detection Systems.                        false alarms [3].
2.1.5) Neural Networks: Neural networks use their
learning algorithms to learn about the relationship       3. SVM (SUPPORT VECTOR MACHINE)
between input and output vectors and to generalize                  Support Vector Machines (SVMs) have
them to extract new input/output relationships. With      developed from Statistical Learning Theory [9]. They
the neural network approach to intrusion detection,       have been widely applied to fields such as character,
the main purpose is to learn the behavior of actors in    handwriting digit and text recognition, and more
the system (e.g., users, daemons). It is known that       recently to satellite image classification. SVMs, like
statistical methods partially equate neural networks.     ANN and other nonparametric classifiers have a
The advantage of using neural networks over               reputation for being robust. SVMs function by
statistics resides in having a simple way to express      nonlinearly projecting the training data in the input
nonlinear relationships between variables, and in         space to a feature space of higher dimension by use
learning      about     relationships    automatically.   of a kernel function. This results in a linearly
Experiments were carried out with neural network          separable dataset that can be separated by a linear
prediction of user behaviors. From the results it has     classifier. This process enables the classification of
been found that the behavior of UNIX super-users          datasets which are usually nonlinearly separable in
(roots) is predictable (because of very regular           the input space. The functions used to project the data
functioning of automatic system processes). With few      from input space to feature space are called kernels
exceptions, behavior of most other users is also          (or kernel machines), examples of which include
predictable.     Neural networks are still a              polynomial, Gaussian (more commonly referred to as
computationally intensive technique, and are not          radial basis functions) and quadratic functions. Each
widely used in the intrusion detection community.         function has unique parameters which have to be



                                                                                                 1723 | P a g e
Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1722-1726
determined prior to classification and they are also      4.2 Parameters Description Chosen for Statistical
usually determined through a cross validation             Analysis.
process. A deeper mathematical treatise of SVMs can       1 ) Number of Hops per Route: This statistic
be found in [10].                                         represents the number of hops in each route to every
         By their nature SVMs are intrinsically           destination in the route table of all nodes in the
binary classifiers however there exists two strategies    network.
one against one & one against all the first one gives     2) Route Discovery Time: The time to discover a
much better performance hence it is selected in our       route to a specific destination is the time when a
proposal.                                                 route request was sent out to discover a route to that
                                                          destination until the time a route reply is received
4. PROPOSED ALGORITHM                                     with a route to that destination. This statistic
          The proposed algorithm can be divided into      represents the time to discover a route to a specific
two parts in first part the modeling & simulation of      destination by all nodes in the network.
the different attacks are performed this part provides    3) Routing Traffic Received: Amount of routing
the training data set for the second part where this      traffic received in packets/sec in the entire network.
data is used to train the SVM which is later used for     4) Routing Traffic Sent: Amount of routing traffic
threat detection & classification.                        sent in packets/sec in the entire network.
4.1 Modeling, Simulation & Analysis of Attacks            5) Total Cached Reply Sent: When a node receives a
After gathering the required details of all types         route request and is not the target of the route request,
(1.blackhole,     2.wormhole,      3.selfish,  4.sleep,   it looks up its route table to determine if it has any
5.flooding, 6.replay, & 7.normal condition) of attack     route to the target of the route request. If so; the node
each type of attack is simulated in OPNET network         sends back a "Cached Route Reply" and does not re-
simulator with following simulation parameters.           broadcast the request packet. This statistic represents
                                                          the total number of cached route replies sent by all
                  TABLE 1                                 nodes in the network.
SIMULATION PARAMETERS                                     6) Total Packet Dropped: When no route is found to
Parameter Name       Value                                the destination, the node drops the packets queued to
Number of Nodes      20                                   the destination.
                                                          7) Total Replies Sent From Destination: Once the
Simulation Time      60 minutes
                                                          destination node receives a route request, it sends a
Area                 1x1 Km.                              route reply to the source of the request. This statistic
Node Speed           10 Km/h                              represents the total number of route reply packets
Packet Size          1024 bits                            sent from all nodes in the network if they are
Routing              AODV                                 destinations of route requests. This statistic represents
Transmitter Power    5 mW                                 the total number of application packets discarded by
Antenna Type         Omni-directional                     all nodes in the network.
                                                          8) Total Route Error Sent: A node may send Hello
                                                          messages to its neighbor to confirm next hop
                                                          reachability. If next hop reachability cannot be
                                                          confirmed, the node sends back a route error message
                                                          to all nodes that use that next hop to reach various
                                                          destinations. This statistic represents the total number
                                                          of route error packets sent by all nodes in the
                                                          network.
                                                          9) Total Route Replies Sent: A node would send back
                                                          a route reply to the source of the request; if a) It was
                                                          the destination of the request b) It had a route to the
                                                          destination in its route table.
                                                          This statistic represents the total number of route
                                                          reply packets sent by all nodes in the network (both
                                                          cached route replies and route replies if it’s a
                                                          destination).
                                                          10) Total Route Requests Sent: This statistic
                                                          represents the total number of route request packets
                                                          sent by all nodes in the network during route
                                                          discovery.
                                                          4.3 Simulation Results from This Part of
                                                          Algorithm
       Figure 1: Snap shot of the simulated
network.



                                                                                                 1724 | P a g e
Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue4, July-August 2012, pp.1722-1726
TABLE 2:                                                                                      TABLE 3
COLLECTED     STATISTICS   OF    DIFFERENT                      SHOWING THE PREDICTED              RESULTS       BY    THE
PARAMETERS FOR BLACK-HOLE ATTACK                               PROPOSED ALGORITHM .
   1     2       3    4     5    6     7     8   9     10      Trainin      Attac    TP     TN     FP       FN        Accu
                                                               g            k        R      R      R        R         --
5 1.01 0.083 182 10         127 1      17    6   141 20        Data         Type                                      racy
10 1.01 0.083 230 13        127 1      17    6   141 20        10           1        1      1      0        0         1
15 1.01 0.048 242 14        68 1       10.8 5    78    12      10           2        1      0.9    0.1      0         0.95
                                                               10           3        0.93   0.93   0.0      0.06      0.93
20 1     0.033 253 14.2 47 1.23 8.9 5.3 44             9.8
                                                                                                   6
25 1.02 0.076 260 14.4 36 2.2 7.8 4.5 39               9.9     10           4        0.91   0.91   0.0      0.08      0.91
30 1.01 0.066 262 14.8 30 2.41 6.4 3.8 25              7.1                                         8
                                                               10           5        1      0.90   0.0      0         0.95
35 1.01 0.066 263 14.9 25 2.41 5.9 3.4 21              6.3                                         9
40 1     0.049 264 15       20 2.6 5.4 3.2 19          5.9     10           6        1      0.88   0.1      0         0.94
                                                                                                   1
45 1     0.042 265 15       21 3.02 5.7 3.3 20.1 6
                                                               10           7        0.91   0.91   0.0      0.08      0.91
50 1     0.038 266 15.1 19 2.7 5             3.1 18    5.2                                         8
55 1     0.037 268 15.2 20 2.72 4.8 3.6 18.1 5.3
                                                               Attack types for table 3: 1.Blackhole, 2.Wormhole,
60 1     0.033 270 15.2 18 2.81 5.1 3.3 18             5.8     3.Selfish, 4.Sleep, 5.Flooding, 6.Replay, 7.Normal
                                                               Condition.
The table 2 shows the network statistics for the
Black-hole attack. In the table each row shows the             5. CONCLUSION
collected parameters after certain time of simulation                    The Network threat detector presented in
(like 5, 10 and 15 minutes etc.) like above table we           this paper is capable of generating alert as well as
simulated the network for Black-hole, wormhole                 classifying the individual attacks. The Detection
selfish, sleep, flooding, replay attacks & for normal          accuracy of the system is up to 95% which is
condition.                                                     excellent also the algorithm have very low FPR (max
                                                               11%) hence reduces the chances of false alarming,
4.4 Training & Validation                                      further it could achieve much better performance for
          In this stage the collected data from previous       only binary detections like attack and non attack
stage is classified into different group based on the          conditions in future it can also be modified with
attack type, then each data set is normalized by               different classification techniques to get much better
detecting its maximum and minimum values by the                results.
following formula
                                  𝑉 − 𝑉 𝑚𝑖𝑛                    REFERENCES
                   𝑉𝑛𝑜𝑟𝑚 =
                               𝑉 𝑚𝑎𝑥 − 𝑉 𝑚𝑖𝑛                        [1]   Simmonds, A; Sandilands, P; van Ekert, L
          The normalized values set are arranged in an                    (2004). "An Ontology for Network Security
array to represent system condition by a vector this                      Attacks". Lecture Notes in Computer
vector can be represented by                                              Science. Lecture Notes in Computer Science
 𝑇𝑟𝑛 𝑣𝑒𝑐𝑡 = [𝑉 𝑛𝑜𝑟𝑚 1 , 𝑉 𝑛𝑜𝑟𝑚 2 , 𝑉 𝑛𝑜𝑟𝑚 3 , … . . 𝑉𝑛𝑜𝑟𝑚𝑛 ]              3285: 317–323.
Hence the system states can be treated as n dimension            [2]      P. Garcı´a-Teodoroa, J. Dı´az-Verdejo, G.
vector.                                                                   Macia´-Ferna´ndeza,        E.      Va´zquezb
          Now these vectors with their classification                     “Anomaly-based         network      intrusion
group are used to train the SVM (Support Vector                           detection     Techniques,     systems     and
Machine) in one against one method.                                       challenges ” published on computers &
          After that for detecting the system status at                   security 28 ( 2009 ) 18 – 28”.
any time the system data is collected and converted in              [3]   http://www.windowsecurity.com/articles/ids-
to the vector as stated above and then it is applied to                   part2-classification-methods- chniques.html
the trained SVM which classifies the network                     [4]      Axelsson S.: Intrusion Detection Systems: A
condition to one of the most matched trained                              Taxomomy and Survey. Technical Report
conditions.                                                               No 99-15, Dept. of Computer Engineering,
                                                                          Chalmers
4.5 Simulation Results for This Part of Algorithm                         UniversityofTechnology,Sweden,March200
        The simulation of the proposed algorithm is                       0,http://www.ce.chalmers.se/staff/sax/taxon
performed using MATLAB 7.5 on IBM P4 PC with                              omy.ps
windows XP operating system.                                        [5]   Bass T.: Intrusion Detection Systems
                                                                          Multisensor      Data    Fusion:    Creating



                                                                                                         1725 | P a g e
Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research
               and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 2, Issue4, July-August 2012, pp.1722-1726
       Cyberspace       Situational     Awareness.
       Communication         of     the     ACM,
       Vol.43,Number1,January2000,pp.99105,http
       ://www.silkroad.com/papers/acm.fusion.ids.
       ps.
[6]    Debar H., Dacier M., Wespi A.: Towards a
       taxonomy of intrusion-detection systems.
       Computer Networks, 31, 1999, pp. 805-822.
[7]    Dorosz P., Kazienko P.: Omijanie intrusion
       detection systems. Software 2.0 no 9 (93),
       September 2002, pages 48-54. (In Polish
       only)
[8]    Dorosz     P.,   Kazienko P.       Systems
       wykrywania      intruzów.    VI    Krajowa
       Konferencja     Zastosowan      Kryptografii
       ENIGMA         2002,      Warsaw      14-17
       May2002,p.TIV4778,(InPolisonly)http://ww
       w.enigma.com.pl/konferencje/vi_kkzk/index
       .htm
[9]    V. N. Vapnik, The Nature of Statistical
       Learning Theory. New York: Springer-
       Verlag, 1995.
[10]   V. Kecman, Learning and Soft Computing:
       Support Vector Machines, Neutral Networks
       and Fuzzy Logic Models. Cambridge, MA:
       MIT Press, 2001.




                                                                            1726 | P a g e

More Related Content

What's hot

A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesIJERA Editor
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analyticsIJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSIJNSA Journal
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkIJRES Journal
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 

What's hot (17)

1776 1779
1776 17791776 1779
1776 1779
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction TechniquesA Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
Bp24447451
Bp24447451Bp24447451
Bp24447451
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
46 102-112
46 102-11246 102-112
46 102-112
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 

Viewers also liked

Viewers also liked (20)

Kc2417271732
Kc2417271732Kc2417271732
Kc2417271732
 
Kh2417561758
Kh2417561758Kh2417561758
Kh2417561758
 
Gn2511881192
Gn2511881192Gn2511881192
Gn2511881192
 
Ke2417381744
Ke2417381744Ke2417381744
Ke2417381744
 
Ky2418521856
Ky2418521856Ky2418521856
Ky2418521856
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 
6496
64966496
6496
 
Día de canarias
Día de canariasDía de canarias
Día de canarias
 
Innovaciones en Formacion Continuada
Innovaciones en Formacion ContinuadaInnovaciones en Formacion Continuada
Innovaciones en Formacion Continuada
 
Presentacion #1 econometria
Presentacion #1 econometriaPresentacion #1 econometria
Presentacion #1 econometria
 
F. informativa sobre os constituintes da frase
F. informativa sobre os constituintes da fraseF. informativa sobre os constituintes da frase
F. informativa sobre os constituintes da frase
 
777
777777
777
 
618
618618
618
 
La Gallina Y Los Huevones
La Gallina Y Los HuevonesLa Gallina Y Los Huevones
La Gallina Y Los Huevones
 
6560
65606560
6560
 
5912
59125912
5912
 
Inscrição nominal modalidade coletiva jesm 2011
Inscrição nominal  modalidade coletiva jesm 2011Inscrição nominal  modalidade coletiva jesm 2011
Inscrição nominal modalidade coletiva jesm 2011
 
Case Solution for GM in China
Case Solution for GM in ChinaCase Solution for GM in China
Case Solution for GM in China
 
5748
57485748
5748
 
El enfermo y el feretro
El enfermo y el feretroEl enfermo y el feretro
El enfermo y el feretro
 

Similar to MANET threat detection using system statistics and SVM

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...IJNSA Journal
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivityIRJET Journal
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques IJERA Editor
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques IJMER
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 

Similar to MANET threat detection using system statistics and SVM (20)

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
1776 1779
1776 17791776 1779
1776 1779
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 

MANET threat detection using system statistics and SVM

  • 1. Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1722-1726 Manet Threat Alarming Based On System Statistics & Support Vector Machine Gajendra Singh Chandel 1 , Priyanka Murotia 2 Department Of Information Technology , Sri Satya Sai Institute Of Science & Technology Sehore, Bhopal (M.P) , India 1,2 Abstract This paper presents a technique for As surveillance and early-warning tools, as the network threat detection and alarming. The honeypots are not normally accessed for legitimate network security is one of the most important purposes. Techniques used by the attackers that aspects while designing a Computer Network; the attempt to compromise these decoy resources are robust Security mechanism is required especially studied during and after an attack to keep an eye on for the networks involving ecommerce & new exploitation techniques. Such analysis may be confidential data. In this paper we presents a used to further tighten security of the actual network statistical & classification approach to identify the being protected by the honeypot [4]. attack. The proposed system takes system statistics like types of packets, delay, drop rate, 2. BASICS OF THREAT DETECTION buffer overflow etc. as input & returns the threat SYSTEM type (Blackhole, Wormhole, and Flooding etc.). A Threat detection system is a device or software application that monitors network or system Keywords- Machine Learning, Network Security, activities for malicious activities or policy violations Security Threats, SVM (Support Vector Machine). and produces reports to a Management Station [1]. Some systems may attempt to stop a Threat attempt 1. INTRODUCTION but this is neither required nor expected of a Network security starts with authenticating monitoring system. Threat detection and prevention the user, commonly with a username and a password. systems are primarily focused on identifying possible Since this requires just one detail authenticating the incidents, logging information about them, and user name i.e. the password, which is something the reporting attempts. In addition, organizations use user 'knows' this is sometimes termed one-factor threat detection systems for other purposes, such as authentication. With two-factor authentication, identifying problems with security policies, something the user 'has' is also used (e.g. a security documenting existing threats, and deterring token or 'dongle', an ATM card, or a mobile phone); individuals from violating security policies. Threat and with three-factor authentication, something the detection systems have become a necessary addition user 'is' is also used (e.g. a fingerprint or retinal scan). to the security infrastructure of nearly every Once authenticated, a firewall enforces access organization. policies such as what services are allowed to be Threat detection systems typically record accessed by the network users [2]. Though effective information related to observed events, notify to prevent unauthorized access, this component may security administrators of important observed events, fail to check potentially harmful content such as and produce reports. Many Threat detection systems computer worms or Trojans being transmitted over can also respond to a detected threat by attempting to the network. Anti-virus software or intrusion prevent it from succeeding. They use several prevention system (IPS)[3] help detect and inhibit the response techniques, which involve the Threat action of such malware. An anomaly-based intrusion detection systems stopping the attack itself, changing detection system may also monitor the network and the security environment (e.g., reconfiguring a traffic for unexpected (i.e. suspicious) content or firewall), or changing the attack’s content. behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee 2.1. Threat Detection Techniques accessing files at strange times. Individual events 2.1.1) Expert Systems: these work on a previously occurring on the network may be logged for audit defined set of rules describing an attack. All security purposes and for later high-level analysis. related events incorporated in an audit trail are Communication between two hosts using a network translated in terms of if-then-else rules. Examples are may be encrypted to maintainprivacy. Honeypots (a Wisdom & Sense and Computer Watch (developed at honeypot is a trap set to detect, deflect, or in some AT&T). manner counteract attempts at unauthorized use of 2.1.2) Signature Analysis: Similarly to expert System information systems), essentially decoy network- approach, this method is based on the attack accessible resources, may be deployed in a network knowledge. They transform the semantic description 1722 | P a g e
  • 2. Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1722-1726 of an attack into the appropriate audit trail format. 2.1.6) User Intention Identification: This technique Thus, attack signatures can be found in logs or input (that to our knowledge has only been used in the data streams in a straightforward way. An attack SECURENET project) models normal behavior of scenario can be described, for example, as a sequence users by the set of high-level tasks they have to of audit events that a given attack generates or perform on the system (in relation to the users’ patterns of searchable data that are captured in the functions). These tasks are taken as series of actions, audit trail. This method uses abstract equivalents of which in turn are matched to the appropriate audit audit trail data. Detection is accomplished by using data. The analyzer keeps a set of tasks that are common text string matching mechanisms. Typically, acceptable for each user. Whenever a mismatch is it is a very powerful technique and as such very often encountered, an alarm is produced. employed in commercial systems (for example 2.1.7) Machine learning: This is an artificial Stalker, Real Secure, NetRanger, Emerald eXpert- intelligence technique that stores the user-input BSM). stream of commands in a vectorial form and is used 2.1.3) State-Transition Analysis: here, an attack is as a reference of normal user behavior profile. described with a set of goals and transitions that must Profiles are then grouped in a library of user be achieved by an intruder to compromise a system. commands having certain common characteristics Transitions are represented on state-transition [3]. diagrams. 2.1.8) Data Mining: generally refers to a set of 2.1.4) Statistical Analysis Approach: this is a techniques that use the process of extracting frequently used method (for example SECURENET). previously unknown but potentially useful data from The user or system behavior (set of attributes) is large stores of data. Data mining method excels at measured by a number of variables over time. processing large system logs (audit data). However Examples of such variables are: user login, logout, they are less useful for stream analysis of network number of files accessed in a period of time, usage of traffic. One of the fundamental data mining disk space, memory, CPU etc. The frequency of techniques used in intrusion detection is associated updating can vary from a few minutes to, for with decision trees [3]. Decision tree models allow example, one month. The system stores mean values one to detect anomalies in large databases. Another for each variable used for detecting exceeds that of a technique refers to segmentation, allowing extraction predefined threshold. Yet, this simple approach was of patterns of unknown attacks [3]. This is done by unable to match a typical user behavior model. matching patterns extracted from a simple audit set Approaches that relied on matching individual user with those referred to warehoused unknown attacks profiles with aggregated group variables also failed to [3]. A typical data mining technique is associated be efficient. Therefore, a more sophisticated model of with finding association rules. It allows one to extract user behavior has been developed using short- and previously unknown knowledge on new attacks [3] or long-term user profiles. These profiles are regularly built on normal behavior patterns. Anomaly detection updated to keep up with the changes in user often generates false alarms. With data mining it is behaviors. Statistical methods are often used in easy to correlate data related to alarms with mined implementations of normal user behavior profile- audit data, thereby considerably reducing the rate of based Intrusion Detection Systems. false alarms [3]. 2.1.5) Neural Networks: Neural networks use their learning algorithms to learn about the relationship 3. SVM (SUPPORT VECTOR MACHINE) between input and output vectors and to generalize Support Vector Machines (SVMs) have them to extract new input/output relationships. With developed from Statistical Learning Theory [9]. They the neural network approach to intrusion detection, have been widely applied to fields such as character, the main purpose is to learn the behavior of actors in handwriting digit and text recognition, and more the system (e.g., users, daemons). It is known that recently to satellite image classification. SVMs, like statistical methods partially equate neural networks. ANN and other nonparametric classifiers have a The advantage of using neural networks over reputation for being robust. SVMs function by statistics resides in having a simple way to express nonlinearly projecting the training data in the input nonlinear relationships between variables, and in space to a feature space of higher dimension by use learning about relationships automatically. of a kernel function. This results in a linearly Experiments were carried out with neural network separable dataset that can be separated by a linear prediction of user behaviors. From the results it has classifier. This process enables the classification of been found that the behavior of UNIX super-users datasets which are usually nonlinearly separable in (roots) is predictable (because of very regular the input space. The functions used to project the data functioning of automatic system processes). With few from input space to feature space are called kernels exceptions, behavior of most other users is also (or kernel machines), examples of which include predictable. Neural networks are still a polynomial, Gaussian (more commonly referred to as computationally intensive technique, and are not radial basis functions) and quadratic functions. Each widely used in the intrusion detection community. function has unique parameters which have to be 1723 | P a g e
  • 3. Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1722-1726 determined prior to classification and they are also 4.2 Parameters Description Chosen for Statistical usually determined through a cross validation Analysis. process. A deeper mathematical treatise of SVMs can 1 ) Number of Hops per Route: This statistic be found in [10]. represents the number of hops in each route to every By their nature SVMs are intrinsically destination in the route table of all nodes in the binary classifiers however there exists two strategies network. one against one & one against all the first one gives 2) Route Discovery Time: The time to discover a much better performance hence it is selected in our route to a specific destination is the time when a proposal. route request was sent out to discover a route to that destination until the time a route reply is received 4. PROPOSED ALGORITHM with a route to that destination. This statistic The proposed algorithm can be divided into represents the time to discover a route to a specific two parts in first part the modeling & simulation of destination by all nodes in the network. the different attacks are performed this part provides 3) Routing Traffic Received: Amount of routing the training data set for the second part where this traffic received in packets/sec in the entire network. data is used to train the SVM which is later used for 4) Routing Traffic Sent: Amount of routing traffic threat detection & classification. sent in packets/sec in the entire network. 4.1 Modeling, Simulation & Analysis of Attacks 5) Total Cached Reply Sent: When a node receives a After gathering the required details of all types route request and is not the target of the route request, (1.blackhole, 2.wormhole, 3.selfish, 4.sleep, it looks up its route table to determine if it has any 5.flooding, 6.replay, & 7.normal condition) of attack route to the target of the route request. If so; the node each type of attack is simulated in OPNET network sends back a "Cached Route Reply" and does not re- simulator with following simulation parameters. broadcast the request packet. This statistic represents the total number of cached route replies sent by all TABLE 1 nodes in the network. SIMULATION PARAMETERS 6) Total Packet Dropped: When no route is found to Parameter Name Value the destination, the node drops the packets queued to Number of Nodes 20 the destination. 7) Total Replies Sent From Destination: Once the Simulation Time 60 minutes destination node receives a route request, it sends a Area 1x1 Km. route reply to the source of the request. This statistic Node Speed 10 Km/h represents the total number of route reply packets Packet Size 1024 bits sent from all nodes in the network if they are Routing AODV destinations of route requests. This statistic represents Transmitter Power 5 mW the total number of application packets discarded by Antenna Type Omni-directional all nodes in the network. 8) Total Route Error Sent: A node may send Hello messages to its neighbor to confirm next hop reachability. If next hop reachability cannot be confirmed, the node sends back a route error message to all nodes that use that next hop to reach various destinations. This statistic represents the total number of route error packets sent by all nodes in the network. 9) Total Route Replies Sent: A node would send back a route reply to the source of the request; if a) It was the destination of the request b) It had a route to the destination in its route table. This statistic represents the total number of route reply packets sent by all nodes in the network (both cached route replies and route replies if it’s a destination). 10) Total Route Requests Sent: This statistic represents the total number of route request packets sent by all nodes in the network during route discovery. 4.3 Simulation Results from This Part of Algorithm Figure 1: Snap shot of the simulated network. 1724 | P a g e
  • 4. Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1722-1726 TABLE 2: TABLE 3 COLLECTED STATISTICS OF DIFFERENT SHOWING THE PREDICTED RESULTS BY THE PARAMETERS FOR BLACK-HOLE ATTACK PROPOSED ALGORITHM . 1 2 3 4 5 6 7 8 9 10 Trainin Attac TP TN FP FN Accu g k R R R R -- 5 1.01 0.083 182 10 127 1 17 6 141 20 Data Type racy 10 1.01 0.083 230 13 127 1 17 6 141 20 10 1 1 1 0 0 1 15 1.01 0.048 242 14 68 1 10.8 5 78 12 10 2 1 0.9 0.1 0 0.95 10 3 0.93 0.93 0.0 0.06 0.93 20 1 0.033 253 14.2 47 1.23 8.9 5.3 44 9.8 6 25 1.02 0.076 260 14.4 36 2.2 7.8 4.5 39 9.9 10 4 0.91 0.91 0.0 0.08 0.91 30 1.01 0.066 262 14.8 30 2.41 6.4 3.8 25 7.1 8 10 5 1 0.90 0.0 0 0.95 35 1.01 0.066 263 14.9 25 2.41 5.9 3.4 21 6.3 9 40 1 0.049 264 15 20 2.6 5.4 3.2 19 5.9 10 6 1 0.88 0.1 0 0.94 1 45 1 0.042 265 15 21 3.02 5.7 3.3 20.1 6 10 7 0.91 0.91 0.0 0.08 0.91 50 1 0.038 266 15.1 19 2.7 5 3.1 18 5.2 8 55 1 0.037 268 15.2 20 2.72 4.8 3.6 18.1 5.3 Attack types for table 3: 1.Blackhole, 2.Wormhole, 60 1 0.033 270 15.2 18 2.81 5.1 3.3 18 5.8 3.Selfish, 4.Sleep, 5.Flooding, 6.Replay, 7.Normal Condition. The table 2 shows the network statistics for the Black-hole attack. In the table each row shows the 5. CONCLUSION collected parameters after certain time of simulation The Network threat detector presented in (like 5, 10 and 15 minutes etc.) like above table we this paper is capable of generating alert as well as simulated the network for Black-hole, wormhole classifying the individual attacks. The Detection selfish, sleep, flooding, replay attacks & for normal accuracy of the system is up to 95% which is condition. excellent also the algorithm have very low FPR (max 11%) hence reduces the chances of false alarming, 4.4 Training & Validation further it could achieve much better performance for In this stage the collected data from previous only binary detections like attack and non attack stage is classified into different group based on the conditions in future it can also be modified with attack type, then each data set is normalized by different classification techniques to get much better detecting its maximum and minimum values by the results. following formula 𝑉 − 𝑉 𝑚𝑖𝑛 REFERENCES 𝑉𝑛𝑜𝑟𝑚 = 𝑉 𝑚𝑎𝑥 − 𝑉 𝑚𝑖𝑛 [1] Simmonds, A; Sandilands, P; van Ekert, L The normalized values set are arranged in an (2004). "An Ontology for Network Security array to represent system condition by a vector this Attacks". Lecture Notes in Computer vector can be represented by Science. Lecture Notes in Computer Science 𝑇𝑟𝑛 𝑣𝑒𝑐𝑡 = [𝑉 𝑛𝑜𝑟𝑚 1 , 𝑉 𝑛𝑜𝑟𝑚 2 , 𝑉 𝑛𝑜𝑟𝑚 3 , … . . 𝑉𝑛𝑜𝑟𝑚𝑛 ] 3285: 317–323. Hence the system states can be treated as n dimension [2] P. Garcı´a-Teodoroa, J. Dı´az-Verdejo, G. vector. Macia´-Ferna´ndeza, E. Va´zquezb Now these vectors with their classification “Anomaly-based network intrusion group are used to train the SVM (Support Vector detection Techniques, systems and Machine) in one against one method. challenges ” published on computers & After that for detecting the system status at security 28 ( 2009 ) 18 – 28”. any time the system data is collected and converted in [3] http://www.windowsecurity.com/articles/ids- to the vector as stated above and then it is applied to part2-classification-methods- chniques.html the trained SVM which classifies the network [4] Axelsson S.: Intrusion Detection Systems: A condition to one of the most matched trained Taxomomy and Survey. Technical Report conditions. No 99-15, Dept. of Computer Engineering, Chalmers 4.5 Simulation Results for This Part of Algorithm UniversityofTechnology,Sweden,March200 The simulation of the proposed algorithm is 0,http://www.ce.chalmers.se/staff/sax/taxon performed using MATLAB 7.5 on IBM P4 PC with omy.ps windows XP operating system. [5] Bass T.: Intrusion Detection Systems Multisensor Data Fusion: Creating 1725 | P a g e
  • 5. Gajendra Singh Chandel, Priyanka Murotia / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1722-1726 Cyberspace Situational Awareness. Communication of the ACM, Vol.43,Number1,January2000,pp.99105,http ://www.silkroad.com/papers/acm.fusion.ids. ps. [6] Debar H., Dacier M., Wespi A.: Towards a taxonomy of intrusion-detection systems. Computer Networks, 31, 1999, pp. 805-822. [7] Dorosz P., Kazienko P.: Omijanie intrusion detection systems. Software 2.0 no 9 (93), September 2002, pages 48-54. (In Polish only) [8] Dorosz P., Kazienko P. Systems wykrywania intruzów. VI Krajowa Konferencja Zastosowan Kryptografii ENIGMA 2002, Warsaw 14-17 May2002,p.TIV4778,(InPolisonly)http://ww w.enigma.com.pl/konferencje/vi_kkzk/index .htm [9] V. N. Vapnik, The Nature of Statistical Learning Theory. New York: Springer- Verlag, 1995. [10] V. Kecman, Learning and Soft Computing: Support Vector Machines, Neutral Networks and Fuzzy Logic Models. Cambridge, MA: MIT Press, 2001. 1726 | P a g e