Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Enhanced Adaptive Acknowledgement[EAACK] -
A Secure Intrusion Detection Sysytem for MANETs
Akshaya Arunan
Guided By: Mrs V...
OUTLINE
1 OBJECTIVE
2 INTRODUCTION
Mobile Ad Hoc Networks(MANET)[3]
Attacks
3 LITERATURE SURVEY
4 PROPOSED SYSTEM
5 SCHEME...
OBJECTIVE
EAACK demonstrates higher malicious behavior detection rates in certain
circumstances while does not greatly affe...
INTRODUCTION
Most used networks - Wireless Local Area Network (WLAN).
A set of mobile nodes are connected to a fixed wired ...
Mobile Ad Hoc Networks[3]
Self-configuring.
Infrastructure-less network - without wires.
Each device is free to move indepe...
Atacks
Denial of service.
Eavesdropping.
Spoofing.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of E...
Figure : MANET
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 ...
LITERATURE SURVEY
WATCHDOG[4]
TWOACK[5]
AACK[7]
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Eng...
WATCHDOG[4]
Aim: To improve throughput of network with the presence of malicious
nodes.
Consists of two parts:
Watchdog
Pa...
Watchdog Limitations
Three problems of Watchdog scheme, namely:
Receiver collision
Limited transmission power
False misbeh...
Figure : RECIEVER COLLISION: Both node B and node X are trying to send
packet 2 to node c at the same time
Akshaya ArunanG...
Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission
power so that the packet transmission can be overheard...
Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour
report even though node B forwarded the packet to node ...
TWOACK[5]
Aim: To resolve the receiver collision and limited transmission power
problems of Watchdog
TWOACK detects misbeh...
Figure : TWOACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015...
AACK[7]
Similar to TWOACK, AACK is an acknowledgement based network layer
scheme.
ACK (identical to TWOACK) + End-to-End a...
PROPOSED SYSTEM - EAACK[1]
Steps:
LOCAL INTEGRATION
GLOBAL INTEGRATION
HOME AGENT
CLASSIFIER
Akshaya ArunanGuided By: Mrs ...
Description
LOCAL INTEGRATION: Self system and finds out the local anomaly
attacks.
GLOBAL INTEGRATION: Finds the intrusion...
Figure : PROPOSED SYSTEM ARCHITECTURE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)E...
SCHEME DESCRIPTION
EAACK consists of three major parts, namely:
Acknowledge (ACK)
Secure-Acknowledge (S-ACK)
Misbehaviour ...
Figure : FLOW CHART OF EAACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK Febr...
CONCLUSION
A comparative study of Secure Intrusion Detection Systems (SIDS) for
discovering malicious nodes and attacks on...
REFERENCE
[1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System
for MANETs” - International Journal of Late...
[3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc
Wireless Networks” - Mobile Computing, Kluwer Academic Pu...
[5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged
Acknowledgements in MANETs” - The 25th International Confere...
THANK YOU.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 /...
Upcoming SlideShare
Loading in …5
×

Akshayappt

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

  • Be the first to like this

Akshayappt

  1. 1. Enhanced Adaptive Acknowledgement[EAACK] - A Secure Intrusion Detection Sysytem for MANETs Akshaya Arunan Guided By: Mrs Vrinda Assistant Proffessor MKALEIT041 February 12, 2015 Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
  2. 2. OUTLINE 1 OBJECTIVE 2 INTRODUCTION Mobile Ad Hoc Networks(MANET)[3] Attacks 3 LITERATURE SURVEY 4 PROPOSED SYSTEM 5 SCHEME DECRIPTION 6 CONCLUSION 7 REFERENCE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
  3. 3. OBJECTIVE EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
  4. 4. INTRODUCTION Most used networks - Wireless Local Area Network (WLAN). A set of mobile nodes are connected to a fixed wired backbone. Short range Risky Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
  5. 5. Mobile Ad Hoc Networks[3] Self-configuring. Infrastructure-less network - without wires. Each device is free to move independently in any direction Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to communicate with roadside equipment. Disadvantage - More vulnerable to attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
  6. 6. Atacks Denial of service. Eavesdropping. Spoofing. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
  7. 7. Figure : MANET Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  8. 8. LITERATURE SURVEY WATCHDOG[4] TWOACK[5] AACK[7] Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  9. 9. WATCHDOG[4] Aim: To improve throughput of network with the presence of malicious nodes. Consists of two parts: Watchdog Pathrater Detection - Promiscuously listens to its next hops transmission. If overhears that its next node failed - increases its failure counter. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
  10. 10. Watchdog Limitations Three problems of Watchdog scheme, namely: Receiver collision Limited transmission power False misbehavior Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  11. 11. Figure : RECIEVER COLLISION: Both node B and node X are trying to send packet 2 to node c at the same time Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  12. 12. Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission power so that the packet transmission can be overheard by node A but too weak to reach node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  13. 13. Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour report even though node B forwarded the packet to node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  14. 14. TWOACK[5] Aim: To resolve the receiver collision and limited transmission power problems of Watchdog TWOACK detects misbehaving links by Acknowledging every data packets. From the source to the destination. Upon retrieval of a packet Sends back an acknowledgement packet Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  15. 15. Figure : TWOACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  16. 16. AACK[7] Similar to TWOACK, AACK is an acknowledgement based network layer scheme. ACK (identical to TWOACK) + End-to-End acknowledgement scheme called ACK. Reduces network overhead. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  17. 17. PROPOSED SYSTEM - EAACK[1] Steps: LOCAL INTEGRATION GLOBAL INTEGRATION HOME AGENT CLASSIFIER Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
  18. 18. Description LOCAL INTEGRATION: Self system and finds out the local anomaly attacks. GLOBAL INTEGRATION: Finds the intrusion result for entire network. HOME AGENT: Gathers information about its system from application layer to routing layer. CLASSIFIER: The Home Agent calls the classifier construction to find out the attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
  19. 19. Figure : PROPOSED SYSTEM ARCHITECTURE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  20. 20. SCHEME DESCRIPTION EAACK consists of three major parts, namely: Acknowledge (ACK) Secure-Acknowledge (S-ACK) Misbehaviour Report Authentication (MRA) Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  21. 21. Figure : FLOW CHART OF EAACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  22. 22. CONCLUSION A comparative study of Secure Intrusion Detection Systems (SIDS) for discovering malicious nodes and attacks on MANETs is presented. Prevention mechanisms alone are not adequate to manage the secure networks. Thus, detection should be focused as another part before an attacker can damage the structure of the system. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  23. 23. REFERENCE [1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System for MANETs” - International Journal of Latest Trends and Technology in Engineering, 2013. [2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network Security” - Springer, 2012. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
  24. 24. [3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc Wireless Networks” - Mobile Computing, Kluwer Academic Publishers, 1996. [4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving Nodes in MANETs” - The 12th International Conference on Information Integration and Web-based Applications Services, 2010. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
  25. 25. [5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged Acknowledgements in MANETs” - The 25th International Conference on Advanced Information Networking and Applications, 2011. [6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network”- IEEE Transactions on Instrumentation and Measurement, 2008. [7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and Wireless Conference, 2003. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
  26. 26. THANK YOU. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19

×