首页> 外文学位 >Intrusion detection and response systems for mobile ad hoc networks.
【24h】

Intrusion detection and response systems for mobile ad hoc networks.

机译:移动自组织网络的入侵检测和响应系统。

获取原文
获取原文并翻译 | 示例

摘要

A mobile ad hoc network (MANET) consists of a group of autonomous mobile nodes with no infrastructure support. The MANET environment is particularly vulnerable due to its dynamic topology, less powerful mobile devices and distributed environment. Unfortunately, many existing protection and defense mechanisms designed for wired networks cannot be applied in this new environment without modifications. In this research, we develop a distributed intrusion detection and response system for MANET specific attacks, and we believe it presents a second line of defense that cannot be replaced by prevention schemes, especially in common MANET scenarios where attacks can easily be launched by insiders or compromised nodes.; In our distributed framework, Intrusion Detection System (IDS) agents are deployed independently on individual mobile hosts. This is desired because we do not have a single traffic concentration point where a centralized IDS server can be deployed. In addition, collaboration among IDS agents can be enabled optionally for a more effective detection model.; The foundation of our detection infrastructure is based on systematic attack analysis in the MANET environment. We use an attack taxonomy study for that purpose. Based on this study, we propose a set of misuse and anomaly detection methods that are suitable of detecting different categories of attacks, and they can handle both known and new attacks effectively. Our approaches are based on routing protocol specification with both categorical and statistical measures. They are collectively known as node-based approaches because the only input to these approaches comes from the local data collected by each node itself.; Node-based approaches is most secure but they may be too restrictive in scenarios where attack or malicious patterns cannot be observed by any isolated node. To address this problem, we have developed cooperative detection approaches to enable collaboration among multiple IDS agents. One approach is to form IDS clusters by grouping nearby nodes, and information can be exchanged within clusters. The cluster-based scheme can result in lower false positive rate and also provide better efficiency in terms of power consumption and resource utilization compared with node-based approaches. As we have learned, security is a big issue in any distributed network without centralized authority. Our clustering protocol can be proved resilient against common security compromises without changing the decentralized assumption.; Intrusion detection will not be very useful unless proper response actions can be taken subsequently. In this research, we further address two important response techniques, traceback and filtering. Traceback schemes are useful to identify the source of a spoofing attack. Existing traceback systems are not suitable for MANET because they rely on incompatible assumptions such as trustworthy routers and static route topology. Instead, we propose a different solution, which we call hotspot-based traceback, that does not rely on these assumptions. Our solution is resilient in the face of arbitrary number of collaborative adversaries. We also develop smart filtering schemes where filters are deployed on selected routers so as to maximize the dropping rate of attack packets while minimizing the dropping rate of normal packets.; To validate our research, we present case study using both ns-2 simulation and MobiEmu emulation platform with three major ad hoc routing protocols: AODV, DSR and OLSR. We implemented various attacks that are representative based on the attack taxonomy. Our experiments show very promising results on detecting attacks in most attack categories using node-based and cluster-based approaches.
机译:移动自组织网络(MANET)由一组没有基础结构支持的自治移动节点组成。 MANET环境由于其动态拓扑,功能较弱的移动设备和分布式环境而特别容易受到攻击。不幸的是,未经修改,许多现有的为有线网络设计的保护和防御机制都无法在这种新环境中应用。在这项研究中,我们开发了针对MANET特定攻击的分布式入侵检测和响应系统,我们认为它提供了第二道防线,无法用预防方案替代,特别是在内部人员或内部人员可以轻松发起攻击的常见MANET场景中。受损的节点。在我们的分布式框架中,入侵检测系统(IDS)代理独立部署在单个移动主机上。这是需要的,因为我们没有可以在其中部署集中式IDS服务器的单个流量集中点。另外,可以选择启用IDS代理之间的协作以建立更有效的检测模型。我们的检测基础结构的基础是基于MANET环境中的系统攻击分析。为此,我们使用了攻击分类法研究。在此基础上,我们提出了一套适用于检测不同类别攻击的滥用和异常检测方法,它们可以有效地处理已知攻击和新攻击。我们的方法基于具有分类和统计度量的路由协议规范。它们被统称为基于节点的方法,因为这些方法的唯一输入来自每个节点本身收集的本地数据。基于节点的方法最安全,但是在任何隔离的节点都无法观察到攻击或恶意模式的情况下,它们可能过于严格。为了解决这个问题,我们开发了协作检测方法来实现多个IDS代理之间的协作。一种方法是通过对附近的节点进行分组来形成IDS群集,并且可以在群集内交换信息。与基于节点的方法相比,基于群集的方案可导致较低的误报率,并在功耗和资源利用率方面提供更高的效率。据了解,在没有集中授权的任何分布式网络中,安全性都是一个大问题。可以证明我们的群集协议可以抵抗常见的安全漏洞,而无需更改分散的假设。除非随后可以采取适当的响应措施,否则入侵检测将不会非常有用。在这项研究中,我们进一步解决了两种重要的响应技术,即回溯和过滤。追溯方案对于识别欺骗攻击的来源很有用。现有的追溯系统不适用于MANET,因为它们依赖于不兼容的假设,例如可信赖的路由器和静态路由拓扑。相反,我们提出了不依赖于这些假设的另一种解决方案,称为基于热点的回溯。面对任意数量的协作对手,我们的解决方案具有弹性。我们还开发了智能过滤方案,在选定的路由器上部署了过滤器,以使攻击数据包的丢弃率最大化,同时使正常数据包的丢弃率最小。为了验证我们的研究,我们使用ns-2仿真和MobiEmu仿真平台以及三个主要的自组织路由协议(AODV,DSR和OLSR)来进行案例研究。我们基于攻击分类法实施了具有代表性的各种攻击。我们的实验显示了使用基于节点和基于群集的方法检测大多数攻击类别中的攻击的非常有希望的结果。

著录项

  • 作者

    Huang, Yi-an.;

  • 作者单位

    Georgia Institute of Technology.;

  • 授予单位 Georgia Institute of Technology.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 180 p.
  • 总页数 180
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号