SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
1
DYNAMIC NEURAL NETWORKS IN THE
DETECTION OF DISTRIBUTED ATTACKS IN MOBILE
AD-HOC NETWORKS
James Cannady
Graduate School of Computer and Information Sciences, Nova Southeastern University,
Fort Lauderdale, FL, USA
cannady@nova.edu
ABSTRACT
This paper describes the latest results of a research program that is designed to enhance the security of
wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability.
The current approach uses learning vector quantization neural networks that have the ability to identify
patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate
a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The
results of the evaluation of the approach and a discussion of additional areas of research is presented.
KEYWORDS
Mobile ad-hoc networks, intrusion detection, neural networks
1. INTRODUCTION
Because of the increasing dependence which companies and government agencies have on their
computer networks the importance of protecting these systems from attack is critical. A single
intrusion of a computer network can result in the loss, unauthorized utilization, or modification
of large amounts of data and cause users to question the reliability of all of the information on
the network. There are numerous methods of responding to a network intrusion, but they all
require the accurate and timely identification of the attack. The individual creativity of
attackers, the wide range of computer hardware and operating systems, and the ever-changing
nature of the overall threat to targeted systems have contributed to the difficulty in effectively
identifying intrusions. Intrusion detection has been an active area of research for the last twenty
years. However, advances in information technology, especially in the use of wireless systems,
and the increasing variety of vulnerable software applications have made the accurate and
timely detection of network-based attacks a critical, but elusive goal.
This paper describes an ongoing research program that is focusing on the development of an
effective intrusion detection capability for MANETs. MANETs are peer-to-peer wireless
networks that rely upon the presence of other network nodes in a limited geographical proximity
to communicate in an ad hoc manner. Unlike other wireless network architectures a MANET
does not reply upon static wireless access points or dedicated servers. Instead, individual
components rely upon the establishment of dynamic connections with other MANET nodes
based on proximity at each point in time. The inherent flexibility of MANETs has led to their
application in a wide range of applications, including military and emergency response
situations. The potential for use as part of a critical information infrastructure, and the
distributed nature of the connections, has increasingly made MANETs the target of focused
complex distributed attacks. At present, the ability to accurately detect and respond to these
attacks relies upon computationally expensive cryptography [1], or centralized intrusion
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
2
detection controllers [2]. There are three inherent complexities in MANETs that make intrusion
detection an especially complicated process and make it difficult to transfer existing wired
intrusion detection approaches to the MANET environment:
1. Lack of a Centralized Control ā€“ Since the nodes in a MANET are distributed independent
entities reliant on localized connectivity there is no single node that is designed to act as a
hub of controller for other components in the MANET. As a result there is similarly no
possibility for a centralized detection monitor that can coordinate the inputs from host-
based intrusion detections on each node. Current network-based intrusion detection
systems require the placement of controlling systems on dedicated servers in strategic
locations [2]. While this reduces the vulnerability inherent in the use of a single
centralized controller the limited number of detection hubs are still vulnerable to loss. As
a result, a distributed reasoning capability is required to support the identification of
attacks in MANETs.
2. Limited Bandwidth Availability ā€“ There is typically far less network bandwidth available
in MANETs than can be provided in traditional wired networks and wireless local area
networks. As a result, the information passed between the distributed nodes must be
prioritized for transmission. Since the primary function of any MANET is some task
other than intrusion detection (e.g., distributing the results of low-power sensors, etc.),
the priority assigned to detection-related messages will necessarily be low. Because of the
limited available bandwidth MANETs are also ill suited to the use of mobile software
agents. In this approach individual agents are dispatched throughout the network to
collect and disseminate detection-relevant data and alerts. Unfortunately, the security of
these mobile agents is extremely difficult to achieve without significant degradation of
the limited bandwidth available in MANETs.
3. Dynamic Connectivity - As a peer-to-peer network that consists of a large number of
nodes that may be highly mobile an effective intrusion detection approach cannot rely on
the presence of any particular node at any particular point in time. Nodes may pass
beyond the proximity of any other node and be dropped off the network. They may later
ā€œappearā€ at a different point in the network at a later time as a result of their renewed
proximity to other MANET components. This is a further complication for any
centralized detection approach.
4. Use of end-to-end cryptography ā€“ Some networks and application utilize end-to-end
cryptography to protect transmitted data. However, this causes the payload information
in the packets to be unavailable for traditional network intrusion detection approaches.
1.1 Mobile Intrusion Detection Requirements
To overcome the inherent challenges posed by the detection of attacks in MANETs, an effective
approach must possess several characteristics ([2]):
ā€¢ Enable the detection of a wide variety of potential attacks. Particular attention should
be provided for distributed attacks that are conducted across the network.
ā€¢ Minimize consumption of network resources. Limitations in network bandwidth and
processing power of individual nodes must be conserved for the primary function of the
MANET. Security functions, including intrusion detection, must operate within the
limited resources that remain after the primary functions of the network have been
satisfied.
ā€¢ Provide autonomous detection. The approach must not rely upon any external analysis
engine or controller. The variability in the connectivity of individual nodes would
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
3
eliminate reliable data exchange with any external monitor or centralized
controllers/monitors.
ā€¢ Utilize data from a variety of sources. Some types of attacks, particularly distributed
attacks, may only be detected through the use of data from multiple sensors. As a result,
the approach should have the ability to leverage data from throughout the MANET.
ā€¢ Enable layered defense. Multiple overlapping views of network activity reduce the
potential for the compromise of the network through the penetration of a single node.
ā€¢ Provide adaptive defense. This characteristic includes both the ability to provide
intrusion detection capabilities in the event of failure, and the ability to identify new forms
of attack against the network. The former requires considerations for system survivability
and the latter is based on dynamic algorithms.
1.2 Prior Research
With the increasing application of MANETs in a variety of applications the need for effective
intrusion detection is in these network is growing. Numerous research efforts have been
conducted to address the requirements for effective MANET intrusion detection. However,
there are a limited number of seminal research efforts that have formed the basis for most of the
current research in the field.
In [2] a comprehensive architecture was designed to address the unique requirements of a
MANET-based detection approach. In their proposed model detection occurs through the use of
a hierarchy in the MANET formed by nodes that serve as clusterheads. These nodes coordinate
the identification of potential attacks between nodes at lower levels in the hierarchy. The paper
describes how the approach could be used to detect specific forms of MANET attacks.
Zhang, et al ([3]) developed a model in which each node is responsible for independently
conducting localized intrusion detection and with sharing data with neighboring nodes to
provide collaborative detective on a broader level. The intrusion detection agents on the nodes
communicate via a secure communication channel with cooperative detection engines. The
resulting multi-layered integrated intrusion detection system demonstrated a scalable approach
that provided both local and global detection.
Vigna, et al, ([4]), developed AODVSTAT, an intrusion detection tool for mobile environments
that was based on earlier research in State Transition Analysis. A group of nodes on the
MANET contained the AODVSTAT sensors. The sensors were designed to gather information
about suspicious events in their neighborhood and share the attack information based on activity
within the MANET.
A significant weakness among most current approaches is the reliance on dedicated messages
that are disseminated throughout the network on a continuous basis. While the data
communicated between the nodes provides valuable information for intrusion detection, it also
utilizes the limited bandwidth available in a MANET. Further, the reliance on dedicated
detection nodes results in a potential vulnerability to the entire process if those nodes are
dropped from the network topology.
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
4
2. APPROACH
The approach used in this research attempts to overcome these inherent limitations by
leveraging the power of neural networks. Neural networks have been previously applied to
intrusion detection [5][6][7]. In this approach the Learning Vector Quantization (LVQ)
algorithm is utilized to identify instances of MANET attacks in a distributed manner. The LVQ
is a combination of a self-organizing map (SOM) for classification and a competitive multilayer
neural network which uses the output of the SOM as input for pattern recognition (Figure 1).
Figure 1: LVQ Architecture
A SOM is a vector quantization method that map patterns from an input space onto a lower
dimensional space of the two-dimensional map. The process preserves the topological
relationships between the inputs to find the best matching unit b in time step t in the following
equation:
ļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗ x(t) ā€“ wb(t)ļ£ŗļ£ŗļ£ŗļ£ŗ = mini {ļ£ŗļ£ŗļ£ŗļ£ŗx(t) ā€“ wi(t)ļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗ}
where I āˆˆ VM, x(t) is a input vector, and wi(t) is a weight vector of the unit i in the map.
Subsequently the weight vector of the best matching unit b is updated towards the given input
vector x(t) according to:
wb(t+1) = wb(t) + Ī³Ī³Ī³Ī³(t)hb(t)(x(t) ā€“ wb(t))
where Ī³(t), 0<Ī³(t)ā‰¤ 1, is a learning rate, and hb(t) is the neighborhood function. SOMs have
been successfully employed in a variety of classification tasks, including anomaly detection in
wired networks [5][6].
The second part of the LVQ algorithm uses the output of the SOM as input to the competitive
layer. The LVQ competitive architecture (Figure 2) contains one hidden layer with Kohonen
neurons, adjustable weights between input and hidden layer and a winner takes it all
mechanism. LVQ algorithms have been employed in the past for applications ranging from
speech recognition [8], to radar image classification [9]. They are frequently used in supervised
learning applications that require efficient processing.
Figure 2: LVQ Competitive Layers
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
5
In this approach the LVQ is used to classify network activity using a first-stage SOM and then
identify patterns of activity representing attacks in the MANET. While the LVQ, like many
other host-based intrusion detection approaches, can effectively identify attacks targeting an
individual MANET node, the purpose of this research was to develop an intrusion detection
approach capable of detecting distributed attacks that require data from multiple nodes for
accurate analysis.
To effectively identify activity in multiple locations within the MANET each node is placed in
promiscuous node. This allows a node to monitor activity on all other nodes within range.
Each node maintains a SOM that processes the activity of the nodes contained within a spatial
area of the node as defined by the range of the node in promiscuous mode. Each of these ā€œarea
mapsā€ allows each node to monitor local activity within its range and classify the activity vector
into a class represented by a node on the two-dimensional SOM map. The output from the
area map held by each node is then fed to the competitive layer of the LVQ which is also on
each node (Figure 3). If a pattern matching a known attack is identified by the competitive layer
the node disseminates an alert throughout the MANET. If a node identifies activity which is
suspicious, but short of the threshold necessary to initiate an alert it can disseminate the
suspicious results to other nodes in the network by utilizing unused space in the regular HELLO
messages that are regularly broadcast by nodes in the MANET.
Figure 3: Distributed Detection Architecture
By distributing the analysis of network activity and the detection of network attacks among all
the nodes in the MANET the need for a centralized processing node, or a limited number of
processing nodes in a hierarchy, is eliminated. The detection process is evenly spread
throughout the entre MANET. This avoids the potential loss of a critical detection component
as a result of a physical loss of the node or dynamic connectivity unrelated to a network attack.
Further, the lack of a centralized detection manager greatly reduces the about of intrusion
detection-related data that must be disseminated throughout the MANET to support a
centralized analytical engine.
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
6
3. RESULTS
To evaluate the effectiveness of our initial approach a simulation using Matlab/Simulinkā„¢ and
ns-2 was developed. A MANET of 18 nodes was created using ns-2 with each node in
promiscuous mode (Table 1).
Parameter Value
Topology 1000m x 1000m
Simulation Time 360 seconds
Nodes 18
Malicious Nodes 1-6
Packet Size 512 bytes
Packet Generation Rate 6 packets/sec
Node Movement Model Random
waypoint
Node Movement Speed 10 m/sec
Pause Time 2 seconds
Feature Sampling
Interval
3 seconds
Table 1: Simulated MANET Characteristics
The experiment evaluated the ability of the proposed approach to identify instances of Man-in-
the-Middle (MIM) attacks in the Ad Hoc On Demand Distance Vector (AODV) routing
protocol. AODV is a reactive distance vector protocol in which routes are established on
demand. When a node seeks to establish a route to a new destination, it broadcasts a route
request (RREQ) through the network. When the first copy of the RREQ reaches its destination,
the destination node sends back a route reply packet traversing the path taken by the RREQ in
reverse order. This establishes that particular route as the shortest path between the requester
and destination. Subsequent RREQs that arrive via longer paths are ignored. Each RREQ
contains a sequence number that is propagated from the requester to the destination. However,
to distinguish ā€œstaleā€ copies of old RREQs from interfering with newer RREQs, the protocol
specifies that RREQs with higher sequence numbers supersede those with older sequence
numbers.
When a malicious node attempts to place itself into the route between two nodes it modifies the
sequence number of the RREQ it receives to a higher number before forwarding it on to its
neighbors. This modification makes it appear that the modified RREQ is the shortest route.
This incorrect RREQ will override the legitimate RREQs from other nodes due to the higher
sequence number. As a result, the malicious node will be able to insert itself into the route. If
this incorrect route is accepted by the other nodes the malicious node will be in a position to
monitor, delay, delete, or otherwise interfere with traffic traveling between the two targets of the
MIM.
During the tests of the approach 80% of the simulated MIM attacks were detected (Figure 4).
Those that fell below the detection threshold did so because the MIM activity being conducted
by the malicious node lasted less than 30 seconds (the HELLO messages were set for broadcast
every 30 seconds). A shorter period between HELLO messages would lower the detection
threshold but also increase the amount of data being broadcast through the MANET. An
example of this type of successful attack was the manipulation of a single RREQ for the
purpose of intercepting one message. While this activity could be potentially significant,
International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010
7
depending on the content of the intercepted message, it is believed that future refinements will
mitigate this residual vulnerability.
Figure 4: Simulation Results
4. CONCLUSION
A new approach to the detection of attacks in MANETs has been presented. While currently
limited to relatively straightforward attacks, such as those against the routing protocols, the
approach has demonstrated positive results within the confines of the decentralized, low
bandwidth, nature of a MANET.
REFERENCES
[1] Razi, M., Quamar, J. ā€A hybrid cryptography model for managing security in dynamic topology
of MANETā€ International Symposium on Biometrics and Security Technologies, 2008.
[2] Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C.., Balupari, R.,
Tseng, C.-Y., Bowen, T. , ā€œA general cooperative intrusion detection architecture for MANETsā€
Proceedings of the 3rD International Workshop on Information Assurance. IEEE, Santa Clara,
CA, 2005
[3] Zhang, Y., Lee, W., and Huang, Y. (2003). ā€œIntrusion detection techniques for mobile
networksā€. Wireless Networks, Volume 9, Issue 5.
[4] Vigna, G, Gwalani, S., Srinivasan, K., Belding-Royer, E., and Kemmerer, R. (2004). ā€œAn
Intrusion Detection Tool for AODV-based Ad Hoc Wireless Networksā€. In Proceedings of the
Annual Computer Security Applications Conference.
[5] Rhodes, B., Mahaffey, J., Cannady, J., ā€œMultiple Self-Organizing Maps for Intrusion Systemsā€
In Proceedings of the 23rd National Information Systems Security Conference. 2000.
[6] Fox, K. L., Henning, R. R., Reed, J. H., and Simonian, R. "A neural network approach towards
intrusion detection". In Proceedings of the 13th National Computer Security Conference. 1990.
[7] Cannady, J. ā€œApplying CMAC-based On-line Learning to Intrusion Detectionā€. Proceedings of
the 2000 IEEE/INNS Joint International Conference on Neural Networks. 2000.
[8] MƤntysalo, J., Torkkola, K., and Kohonen, T. "LVQ-based speech recognition with high-
dimensional context vectors". In Proceedings of the International Conference on Spoken
Language Processing, Edmonton, Alberta, Canada, 1992.
[9] Chang, K., and Lu, Y. "Feedback learning: a hybrid SOFM/LVQ approach for radar target
classification". In Proceedings of the International Symposium on Artificial Neural
Networks. 1994.

More Related Content

What's hot

Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
Ā 
Am03402220229
Am03402220229Am03402220229
Am03402220229ijceronline
Ā 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
Ā 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
Ā 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
Ā 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
Ā 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
Ā 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
Ā 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
Ā 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)CSCJournals
Ā 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetijctet
Ā 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
Ā 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
Ā 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksambitlick
Ā 

What's hot (18)

Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
Ā 
Am03402220229
Am03402220229Am03402220229
Am03402220229
Ā 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
Ā 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Ā 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
Ā 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Ā 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Ā 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Ā 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
Ā 
Protocol manet
Protocol manetProtocol manet
Protocol manet
Ā 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
Ā 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Ā 
International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)International Journal of Computer Science and Security Volume (2) Issue (1)
International Journal of Computer Science and Security Volume (2) Issue (1)
Ā 
Investigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manetInvestigation of detection &amp; prevention sinkhole attack in manet
Investigation of detection &amp; prevention sinkhole attack in manet
Ā 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Ā 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
Ā 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
Ā 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
Ā 

Similar to Dynamic Neural Networks Detect Distributed MANET Attacks

An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
Ā 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
Ā 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
Ā 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
Ā 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
Ā 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
Ā 
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
Ā 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
Ā 
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESSURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESIJNSA Journal
Ā 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Ā 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd Iaetsd
Ā 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
Ā 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
Ā 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
Ā 

Similar to Dynamic Neural Networks Detect Distributed MANET Attacks (20)

An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
Ā 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
Ā 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
Ā 
Iss3
Iss3Iss3
Iss3
Ā 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
Ā 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
Ā 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Ā 
Science journal
Science journalScience journal
Science journal
Ā 
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
Ā 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
Ā 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
Ā 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Ā 
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHESSURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES
Ā 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
Ā 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
Ā 
Ar34261268
Ar34261268Ar34261268
Ar34261268
Ā 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
Ā 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
Ā 
A survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manetsA survey on different cross layer attacks and their defenses in manets
A survey on different cross layer attacks and their defenses in manets
Ā 
E0432933
E0432933E0432933
E0432933
Ā 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Ā 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĆ£o Esperancinha
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Ā 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Ā 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Ā 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Ā 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Ā 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Ā 

Dynamic Neural Networks Detect Distributed MANET Attacks

  • 1. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 1 DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS James Cannady Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA cannady@nova.edu ABSTRACT This paper describes the latest results of a research program that is designed to enhance the security of wireless mobile ad hoc networks (MANET) by developing a distributed intrusion detection capability. The current approach uses learning vector quantization neural networks that have the ability to identify patterns of network attacks in a distributed manner. This capability enables this approach to demonstrate a distributed analysis functionality that facilitates the detection of complex attacks against MANETs. The results of the evaluation of the approach and a discussion of additional areas of research is presented. KEYWORDS Mobile ad-hoc networks, intrusion detection, neural networks 1. INTRODUCTION Because of the increasing dependence which companies and government agencies have on their computer networks the importance of protecting these systems from attack is critical. A single intrusion of a computer network can result in the loss, unauthorized utilization, or modification of large amounts of data and cause users to question the reliability of all of the information on the network. There are numerous methods of responding to a network intrusion, but they all require the accurate and timely identification of the attack. The individual creativity of attackers, the wide range of computer hardware and operating systems, and the ever-changing nature of the overall threat to targeted systems have contributed to the difficulty in effectively identifying intrusions. Intrusion detection has been an active area of research for the last twenty years. However, advances in information technology, especially in the use of wireless systems, and the increasing variety of vulnerable software applications have made the accurate and timely detection of network-based attacks a critical, but elusive goal. This paper describes an ongoing research program that is focusing on the development of an effective intrusion detection capability for MANETs. MANETs are peer-to-peer wireless networks that rely upon the presence of other network nodes in a limited geographical proximity to communicate in an ad hoc manner. Unlike other wireless network architectures a MANET does not reply upon static wireless access points or dedicated servers. Instead, individual components rely upon the establishment of dynamic connections with other MANET nodes based on proximity at each point in time. The inherent flexibility of MANETs has led to their application in a wide range of applications, including military and emergency response situations. The potential for use as part of a critical information infrastructure, and the distributed nature of the connections, has increasingly made MANETs the target of focused complex distributed attacks. At present, the ability to accurately detect and respond to these attacks relies upon computationally expensive cryptography [1], or centralized intrusion
  • 2. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 2 detection controllers [2]. There are three inherent complexities in MANETs that make intrusion detection an especially complicated process and make it difficult to transfer existing wired intrusion detection approaches to the MANET environment: 1. Lack of a Centralized Control ā€“ Since the nodes in a MANET are distributed independent entities reliant on localized connectivity there is no single node that is designed to act as a hub of controller for other components in the MANET. As a result there is similarly no possibility for a centralized detection monitor that can coordinate the inputs from host- based intrusion detections on each node. Current network-based intrusion detection systems require the placement of controlling systems on dedicated servers in strategic locations [2]. While this reduces the vulnerability inherent in the use of a single centralized controller the limited number of detection hubs are still vulnerable to loss. As a result, a distributed reasoning capability is required to support the identification of attacks in MANETs. 2. Limited Bandwidth Availability ā€“ There is typically far less network bandwidth available in MANETs than can be provided in traditional wired networks and wireless local area networks. As a result, the information passed between the distributed nodes must be prioritized for transmission. Since the primary function of any MANET is some task other than intrusion detection (e.g., distributing the results of low-power sensors, etc.), the priority assigned to detection-related messages will necessarily be low. Because of the limited available bandwidth MANETs are also ill suited to the use of mobile software agents. In this approach individual agents are dispatched throughout the network to collect and disseminate detection-relevant data and alerts. Unfortunately, the security of these mobile agents is extremely difficult to achieve without significant degradation of the limited bandwidth available in MANETs. 3. Dynamic Connectivity - As a peer-to-peer network that consists of a large number of nodes that may be highly mobile an effective intrusion detection approach cannot rely on the presence of any particular node at any particular point in time. Nodes may pass beyond the proximity of any other node and be dropped off the network. They may later ā€œappearā€ at a different point in the network at a later time as a result of their renewed proximity to other MANET components. This is a further complication for any centralized detection approach. 4. Use of end-to-end cryptography ā€“ Some networks and application utilize end-to-end cryptography to protect transmitted data. However, this causes the payload information in the packets to be unavailable for traditional network intrusion detection approaches. 1.1 Mobile Intrusion Detection Requirements To overcome the inherent challenges posed by the detection of attacks in MANETs, an effective approach must possess several characteristics ([2]): ā€¢ Enable the detection of a wide variety of potential attacks. Particular attention should be provided for distributed attacks that are conducted across the network. ā€¢ Minimize consumption of network resources. Limitations in network bandwidth and processing power of individual nodes must be conserved for the primary function of the MANET. Security functions, including intrusion detection, must operate within the limited resources that remain after the primary functions of the network have been satisfied. ā€¢ Provide autonomous detection. The approach must not rely upon any external analysis engine or controller. The variability in the connectivity of individual nodes would
  • 3. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 3 eliminate reliable data exchange with any external monitor or centralized controllers/monitors. ā€¢ Utilize data from a variety of sources. Some types of attacks, particularly distributed attacks, may only be detected through the use of data from multiple sensors. As a result, the approach should have the ability to leverage data from throughout the MANET. ā€¢ Enable layered defense. Multiple overlapping views of network activity reduce the potential for the compromise of the network through the penetration of a single node. ā€¢ Provide adaptive defense. This characteristic includes both the ability to provide intrusion detection capabilities in the event of failure, and the ability to identify new forms of attack against the network. The former requires considerations for system survivability and the latter is based on dynamic algorithms. 1.2 Prior Research With the increasing application of MANETs in a variety of applications the need for effective intrusion detection is in these network is growing. Numerous research efforts have been conducted to address the requirements for effective MANET intrusion detection. However, there are a limited number of seminal research efforts that have formed the basis for most of the current research in the field. In [2] a comprehensive architecture was designed to address the unique requirements of a MANET-based detection approach. In their proposed model detection occurs through the use of a hierarchy in the MANET formed by nodes that serve as clusterheads. These nodes coordinate the identification of potential attacks between nodes at lower levels in the hierarchy. The paper describes how the approach could be used to detect specific forms of MANET attacks. Zhang, et al ([3]) developed a model in which each node is responsible for independently conducting localized intrusion detection and with sharing data with neighboring nodes to provide collaborative detective on a broader level. The intrusion detection agents on the nodes communicate via a secure communication channel with cooperative detection engines. The resulting multi-layered integrated intrusion detection system demonstrated a scalable approach that provided both local and global detection. Vigna, et al, ([4]), developed AODVSTAT, an intrusion detection tool for mobile environments that was based on earlier research in State Transition Analysis. A group of nodes on the MANET contained the AODVSTAT sensors. The sensors were designed to gather information about suspicious events in their neighborhood and share the attack information based on activity within the MANET. A significant weakness among most current approaches is the reliance on dedicated messages that are disseminated throughout the network on a continuous basis. While the data communicated between the nodes provides valuable information for intrusion detection, it also utilizes the limited bandwidth available in a MANET. Further, the reliance on dedicated detection nodes results in a potential vulnerability to the entire process if those nodes are dropped from the network topology.
  • 4. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 4 2. APPROACH The approach used in this research attempts to overcome these inherent limitations by leveraging the power of neural networks. Neural networks have been previously applied to intrusion detection [5][6][7]. In this approach the Learning Vector Quantization (LVQ) algorithm is utilized to identify instances of MANET attacks in a distributed manner. The LVQ is a combination of a self-organizing map (SOM) for classification and a competitive multilayer neural network which uses the output of the SOM as input for pattern recognition (Figure 1). Figure 1: LVQ Architecture A SOM is a vector quantization method that map patterns from an input space onto a lower dimensional space of the two-dimensional map. The process preserves the topological relationships between the inputs to find the best matching unit b in time step t in the following equation: ļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗ x(t) ā€“ wb(t)ļ£ŗļ£ŗļ£ŗļ£ŗ = mini {ļ£ŗļ£ŗļ£ŗļ£ŗx(t) ā€“ wi(t)ļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗļ£ŗ} where I āˆˆ VM, x(t) is a input vector, and wi(t) is a weight vector of the unit i in the map. Subsequently the weight vector of the best matching unit b is updated towards the given input vector x(t) according to: wb(t+1) = wb(t) + Ī³Ī³Ī³Ī³(t)hb(t)(x(t) ā€“ wb(t)) where Ī³(t), 0<Ī³(t)ā‰¤ 1, is a learning rate, and hb(t) is the neighborhood function. SOMs have been successfully employed in a variety of classification tasks, including anomaly detection in wired networks [5][6]. The second part of the LVQ algorithm uses the output of the SOM as input to the competitive layer. The LVQ competitive architecture (Figure 2) contains one hidden layer with Kohonen neurons, adjustable weights between input and hidden layer and a winner takes it all mechanism. LVQ algorithms have been employed in the past for applications ranging from speech recognition [8], to radar image classification [9]. They are frequently used in supervised learning applications that require efficient processing. Figure 2: LVQ Competitive Layers
  • 5. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 5 In this approach the LVQ is used to classify network activity using a first-stage SOM and then identify patterns of activity representing attacks in the MANET. While the LVQ, like many other host-based intrusion detection approaches, can effectively identify attacks targeting an individual MANET node, the purpose of this research was to develop an intrusion detection approach capable of detecting distributed attacks that require data from multiple nodes for accurate analysis. To effectively identify activity in multiple locations within the MANET each node is placed in promiscuous node. This allows a node to monitor activity on all other nodes within range. Each node maintains a SOM that processes the activity of the nodes contained within a spatial area of the node as defined by the range of the node in promiscuous mode. Each of these ā€œarea mapsā€ allows each node to monitor local activity within its range and classify the activity vector into a class represented by a node on the two-dimensional SOM map. The output from the area map held by each node is then fed to the competitive layer of the LVQ which is also on each node (Figure 3). If a pattern matching a known attack is identified by the competitive layer the node disseminates an alert throughout the MANET. If a node identifies activity which is suspicious, but short of the threshold necessary to initiate an alert it can disseminate the suspicious results to other nodes in the network by utilizing unused space in the regular HELLO messages that are regularly broadcast by nodes in the MANET. Figure 3: Distributed Detection Architecture By distributing the analysis of network activity and the detection of network attacks among all the nodes in the MANET the need for a centralized processing node, or a limited number of processing nodes in a hierarchy, is eliminated. The detection process is evenly spread throughout the entre MANET. This avoids the potential loss of a critical detection component as a result of a physical loss of the node or dynamic connectivity unrelated to a network attack. Further, the lack of a centralized detection manager greatly reduces the about of intrusion detection-related data that must be disseminated throughout the MANET to support a centralized analytical engine.
  • 6. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 6 3. RESULTS To evaluate the effectiveness of our initial approach a simulation using Matlab/Simulinkā„¢ and ns-2 was developed. A MANET of 18 nodes was created using ns-2 with each node in promiscuous mode (Table 1). Parameter Value Topology 1000m x 1000m Simulation Time 360 seconds Nodes 18 Malicious Nodes 1-6 Packet Size 512 bytes Packet Generation Rate 6 packets/sec Node Movement Model Random waypoint Node Movement Speed 10 m/sec Pause Time 2 seconds Feature Sampling Interval 3 seconds Table 1: Simulated MANET Characteristics The experiment evaluated the ability of the proposed approach to identify instances of Man-in- the-Middle (MIM) attacks in the Ad Hoc On Demand Distance Vector (AODV) routing protocol. AODV is a reactive distance vector protocol in which routes are established on demand. When a node seeks to establish a route to a new destination, it broadcasts a route request (RREQ) through the network. When the first copy of the RREQ reaches its destination, the destination node sends back a route reply packet traversing the path taken by the RREQ in reverse order. This establishes that particular route as the shortest path between the requester and destination. Subsequent RREQs that arrive via longer paths are ignored. Each RREQ contains a sequence number that is propagated from the requester to the destination. However, to distinguish ā€œstaleā€ copies of old RREQs from interfering with newer RREQs, the protocol specifies that RREQs with higher sequence numbers supersede those with older sequence numbers. When a malicious node attempts to place itself into the route between two nodes it modifies the sequence number of the RREQ it receives to a higher number before forwarding it on to its neighbors. This modification makes it appear that the modified RREQ is the shortest route. This incorrect RREQ will override the legitimate RREQs from other nodes due to the higher sequence number. As a result, the malicious node will be able to insert itself into the route. If this incorrect route is accepted by the other nodes the malicious node will be in a position to monitor, delay, delete, or otherwise interfere with traffic traveling between the two targets of the MIM. During the tests of the approach 80% of the simulated MIM attacks were detected (Figure 4). Those that fell below the detection threshold did so because the MIM activity being conducted by the malicious node lasted less than 30 seconds (the HELLO messages were set for broadcast every 30 seconds). A shorter period between HELLO messages would lower the detection threshold but also increase the amount of data being broadcast through the MANET. An example of this type of successful attack was the manipulation of a single RREQ for the purpose of intercepting one message. While this activity could be potentially significant,
  • 7. International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010 7 depending on the content of the intercepted message, it is believed that future refinements will mitigate this residual vulnerability. Figure 4: Simulation Results 4. CONCLUSION A new approach to the detection of attacks in MANETs has been presented. While currently limited to relatively straightforward attacks, such as those against the routing protocols, the approach has demonstrated positive results within the confines of the decentralized, low bandwidth, nature of a MANET. REFERENCES [1] Razi, M., Quamar, J. ā€A hybrid cryptography model for managing security in dynamic topology of MANETā€ International Symposium on Biometrics and Security Technologies, 2008. [2] Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C.., Balupari, R., Tseng, C.-Y., Bowen, T. , ā€œA general cooperative intrusion detection architecture for MANETsā€ Proceedings of the 3rD International Workshop on Information Assurance. IEEE, Santa Clara, CA, 2005 [3] Zhang, Y., Lee, W., and Huang, Y. (2003). ā€œIntrusion detection techniques for mobile networksā€. Wireless Networks, Volume 9, Issue 5. [4] Vigna, G, Gwalani, S., Srinivasan, K., Belding-Royer, E., and Kemmerer, R. (2004). ā€œAn Intrusion Detection Tool for AODV-based Ad Hoc Wireless Networksā€. In Proceedings of the Annual Computer Security Applications Conference. [5] Rhodes, B., Mahaffey, J., Cannady, J., ā€œMultiple Self-Organizing Maps for Intrusion Systemsā€ In Proceedings of the 23rd National Information Systems Security Conference. 2000. [6] Fox, K. L., Henning, R. R., Reed, J. H., and Simonian, R. "A neural network approach towards intrusion detection". In Proceedings of the 13th National Computer Security Conference. 1990. [7] Cannady, J. ā€œApplying CMAC-based On-line Learning to Intrusion Detectionā€. Proceedings of the 2000 IEEE/INNS Joint International Conference on Neural Networks. 2000. [8] MƤntysalo, J., Torkkola, K., and Kohonen, T. "LVQ-based speech recognition with high- dimensional context vectors". In Proceedings of the International Conference on Spoken Language Processing, Edmonton, Alberta, Canada, 1992. [9] Chang, K., and Lu, Y. "Feedback learning: a hybrid SOFM/LVQ approach for radar target classification". In Proceedings of the International Symposium on Artificial Neural Networks. 1994.