Enhanced Adaptive Acknowledgement[EAACK] -
A Secure Intrusion Detection Sysytem for MANETs
Akshaya Arunan
Guided By: Mrs Vrinda
Assistant Proffessor
MKALEIT041
February 12, 2015
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
OUTLINE
1 OBJECTIVE
2 INTRODUCTION
Mobile Ad Hoc Networks(MANET)[3]
Attacks
3 LITERATURE SURVEY
4 PROPOSED SYSTEM
5 SCHEME DECRIPTION
6 CONCLUSION
7 REFERENCE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
OBJECTIVE
EAACK demonstrates higher malicious behavior detection rates in certain
circumstances while does not greatly affect the network performances.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
INTRODUCTION
Most used networks - Wireless Local Area Network (WLAN).
A set of mobile nodes are connected to a fixed wired backbone.
Short range
Risky
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
Mobile Ad Hoc Networks[3]
Self-configuring.
Infrastructure-less network - without wires.
Each device is free to move independently in any direction
Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to
communicate with roadside equipment.
Disadvantage - More vulnerable to attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
Atacks
Denial of service.
Eavesdropping.
Spoofing.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
Figure : MANET
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
LITERATURE SURVEY
WATCHDOG[4]
TWOACK[5]
AACK[7]
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
WATCHDOG[4]
Aim: To improve throughput of network with the presence of malicious
nodes.
Consists of two parts:
Watchdog
Pathrater
Detection - Promiscuously listens to its next hops transmission.
If overhears that its next node failed - increases its failure counter.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
Watchdog Limitations
Three problems of Watchdog scheme, namely:
Receiver collision
Limited transmission power
False misbehavior
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : RECIEVER COLLISION: Both node B and node X are trying to send
packet 2 to node c at the same time
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission
power so that the packet transmission can be overheard by node A but too weak
to reach node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour
report even though node B forwarded the packet to node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
TWOACK[5]
Aim: To resolve the receiver collision and limited transmission power
problems of Watchdog
TWOACK detects misbehaving links by
Acknowledging every data packets.
From the source to the destination.
Upon retrieval of a packet
Sends back an acknowledgement packet
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
Figure : TWOACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
AACK[7]
Similar to TWOACK, AACK is an acknowledgement based network layer
scheme.
ACK (identical to TWOACK) + End-to-End acknowledgement scheme
called ACK.
Reduces network overhead.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
PROPOSED SYSTEM - EAACK[1]
Steps:
LOCAL INTEGRATION
GLOBAL INTEGRATION
HOME AGENT
CLASSIFIER
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
Description
LOCAL INTEGRATION: Self system and finds out the local anomaly
attacks.
GLOBAL INTEGRATION: Finds the intrusion result for entire network.
HOME AGENT: Gathers information about its system from application
layer to routing layer.
CLASSIFIER: The Home Agent calls the classifier construction to find out
the attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
Figure : PROPOSED SYSTEM ARCHITECTURE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
SCHEME DESCRIPTION
EAACK consists of three major parts, namely:
Acknowledge (ACK)
Secure-Acknowledge (S-ACK)
Misbehaviour Report Authentication (MRA)
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
Figure : FLOW CHART OF EAACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
CONCLUSION
A comparative study of Secure Intrusion Detection Systems (SIDS) for
discovering malicious nodes and attacks on MANETs is presented.
Prevention mechanisms alone are not adequate to manage the secure
networks.
Thus, detection should be focused as another part before an attacker can
damage the structure of the system.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
REFERENCE
[1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System
for MANETs” - International Journal of Latest Trends and Technology in
Engineering, 2013.
[2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network
Security” - Springer, 2012.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
[3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc
Wireless Networks” - Mobile Computing, Kluwer Academic Publishers,
1996.
[4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving
Nodes in MANETs” - The 12th International Conference on Information
Integration and Web-based Applications Services, 2010.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
[5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged
Acknowledgements in MANETs” - The 25th International Conference on
Advanced Information Networking and Applications, 2011.
[6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a
Distributed Wireless Sensor Network”- IEEE Transactions on
Instrumentation and Measurement, 2008.
[7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for
Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and
Wireless Conference, 2003.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
THANK YOU.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19

Akshayappt

  • 1.
    Enhanced Adaptive Acknowledgement[EAACK]- A Secure Intrusion Detection Sysytem for MANETs Akshaya Arunan Guided By: Mrs Vrinda Assistant Proffessor MKALEIT041 February 12, 2015 Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
  • 2.
    OUTLINE 1 OBJECTIVE 2 INTRODUCTION MobileAd Hoc Networks(MANET)[3] Attacks 3 LITERATURE SURVEY 4 PROPOSED SYSTEM 5 SCHEME DECRIPTION 6 CONCLUSION 7 REFERENCE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
  • 3.
    OBJECTIVE EAACK demonstrates highermalicious behavior detection rates in certain circumstances while does not greatly affect the network performances. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
  • 4.
    INTRODUCTION Most used networks- Wireless Local Area Network (WLAN). A set of mobile nodes are connected to a fixed wired backbone. Short range Risky Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
  • 5.
    Mobile Ad HocNetworks[3] Self-configuring. Infrastructure-less network - without wires. Each device is free to move independently in any direction Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to communicate with roadside equipment. Disadvantage - More vulnerable to attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
  • 6.
    Atacks Denial of service. Eavesdropping. Spoofing. AkshayaArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
  • 7.
    Figure : MANET AkshayaArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 8.
    LITERATURE SURVEY WATCHDOG[4] TWOACK[5] AACK[7] Akshaya ArunanGuidedBy: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 9.
    WATCHDOG[4] Aim: To improvethroughput of network with the presence of malicious nodes. Consists of two parts: Watchdog Pathrater Detection - Promiscuously listens to its next hops transmission. If overhears that its next node failed - increases its failure counter. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
  • 10.
    Watchdog Limitations Three problemsof Watchdog scheme, namely: Receiver collision Limited transmission power False misbehavior Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 11.
    Figure : RECIEVERCOLLISION: Both node B and node X are trying to send packet 2 to node c at the same time Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 12.
    Figure : LIMITEDTRANSMISSION POWER: Node B limits its transmission power so that the packet transmission can be overheard by node A but too weak to reach node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 13.
    Figure : FALSEMISBEHAVIOUR REPORT: Node A sends back misbehaviour report even though node B forwarded the packet to node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 14.
    TWOACK[5] Aim: To resolvethe receiver collision and limited transmission power problems of Watchdog TWOACK detects misbehaving links by Acknowledging every data packets. From the source to the destination. Upon retrieval of a packet Sends back an acknowledgement packet Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 15.
    Figure : TWOACK AkshayaArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 16.
    AACK[7] Similar to TWOACK,AACK is an acknowledgement based network layer scheme. ACK (identical to TWOACK) + End-to-End acknowledgement scheme called ACK. Reduces network overhead. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 17.
    PROPOSED SYSTEM -EAACK[1] Steps: LOCAL INTEGRATION GLOBAL INTEGRATION HOME AGENT CLASSIFIER Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
  • 18.
    Description LOCAL INTEGRATION: Selfsystem and finds out the local anomaly attacks. GLOBAL INTEGRATION: Finds the intrusion result for entire network. HOME AGENT: Gathers information about its system from application layer to routing layer. CLASSIFIER: The Home Agent calls the classifier construction to find out the attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
  • 19.
    Figure : PROPOSEDSYSTEM ARCHITECTURE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 20.
    SCHEME DESCRIPTION EAACK consistsof three major parts, namely: Acknowledge (ACK) Secure-Acknowledge (S-ACK) Misbehaviour Report Authentication (MRA) Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 21.
    Figure : FLOWCHART OF EAACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 22.
    CONCLUSION A comparative studyof Secure Intrusion Detection Systems (SIDS) for discovering malicious nodes and attacks on MANETs is presented. Prevention mechanisms alone are not adequate to manage the secure networks. Thus, detection should be focused as another part before an attacker can damage the structure of the system. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 23.
    REFERENCE [1] Elhadi M.Shakshuki - ”EAACK A Secure Intrusion Detection System for MANETs” - International Journal of Latest Trends and Technology in Engineering, 2013. [2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network Security” - Springer, 2012. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
  • 24.
    [3] D. Johnsonand D. Maltz. - ”Dynamic Source Routing in Ad hoc Wireless Networks” - Mobile Computing, Kluwer Academic Publishers, 1996. [4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving Nodes in MANETs” - The 12th International Conference on Information Integration and Web-based Applications Services, 2010. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
  • 25.
    [5] N. Kang,E. Shakshuki and T. Sheltami - ”Detecting Forged Acknowledgements in MANETs” - The 25th International Conference on Advanced Information Networking and Applications, 2011. [6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network”- IEEE Transactions on Instrumentation and Measurement, 2008. [7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and Wireless Conference, 2003. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
  • 26.
    THANK YOU. Akshaya ArunanGuidedBy: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19