Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Security in Mobile Ad Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
A Survey of Secure Wireless Ad Hoc Routing
Application of Bayesian Network in Computer Networks Raza H. Abedi.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Jorge Hortelano, Juan Carlos Ruiz, Pietro Manzoni
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust Level Based Self-Organized Routing Protocol for Secure Ad Hoc Networks Li Xiaoqi, GiGi 12/3/2002.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Wireless Sensor Network Security Anuj Nagar CS 590.
Power saving technique for multi-hop ad hoc wireless networks.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Effect Of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Author: J.H. Cho, I.R. Chen and P.G. Feng.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Trust-based Multi-Objective Optimization for Node-to-Task Assignment in Coalition Networks 1 Jin-Hee Cho, Ing-Ray Chen, Yating Wang, and Kevin S. Chan.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Trust Model Based Self-Organized Routing Protocol For Secure Ad Hoc Networks Li Xiaoqi CSE Department, CUHK 29/04/2003.
Presented by Fei Huang Virginia Tech April 4, 2007.
Shambhu Upadhyaya 1 Ad Hoc Networks Routing Security Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 19)
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Attacks in Sensor Networks Team Members: Subramanian Madhanagopal Sivasankaran Rahul Poondy Mukundan.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Ad Hoc Network.
Tufts Wireless Laboratory Tufts University School Of Engineering Real-Time Data Services for Cyber Physical Systems Zhong Zou.
Optimal Batch Rekeying for Secure Group Communications in Wireless Networks Authors: Jin-Hee Cho, Ing-ray Chen, Mohamed Eltoweissy Presented by Niharika.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Attacks and Counter Defense Mechanisms for Cyber-Physical Systems 1 Taha Hassan Lulu Wang CS 5214 Fall 2015.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
Presented by Edith Ngai MPhil Term 3 Presentation
Mobile ad hoc networking: imperatives and challenges
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities MobiHoc, 2005 Presented by An Dong-hyeok CNLAB at KAIST.
Presentation transcript:

Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY, VOL. 59, NO. 1, MARCH Clarence Bingsheng Wang – CS5214– M & E of CSs of Mission-Oriented Mobile Group Systems Reporter: Clarence Bingsheng Wang in Mobile Ad Hoc Networks

Effect of IDSs on Reliability Outline Introduction & Background System Model Performance Model Parameterization Numerical Results & Analysis Applicability & Conclusion Reference Q & A Clarence Bingsheng Wang – CS5214– M & E of CSs2

Effect of IDSs on Reliability Introduction Analyzing the effect of intrusion detection system (IDS) techniques on the reliability of a mission-oriented group communication in mobile ad hoc networks. Knowing design conditions for employing intrusion detection system (IDS) techniques that can enhance the reliability, and thus prolong the lifetime of GCS. Clarence Bingsheng Wang – CS5214– M & E of CSs3

Effect of IDSs on Reliability Introduction Identify the optimal rate at which IDS should be executed to maximize the system lifetime. Consider the effect of security threats, and Intrusion Detection Systems (IDSs) techniques on system lifetime of a mission-oriented Group Communication System (GCS) in Mobile Ad Hoc Networks (MANETs). Clarence Bingsheng Wang – CS5214– M & E of CSs4

Effect of IDSs on Reliability Background Mobile ad hoc networks (MANETs)  Move Independently: Rapid Change in Topology  Forward Traffic Clarence Bingsheng Wang – CS5214– M & E of CSs5

Effect of IDSs on Reliability Background Group Communication Systems. GGroup: “Directly Communicate” GGroup Partition GGroup Merge Security Protocol in MANETs CCharacteristics Actions Against Malicious Attacks PPrevention: “Security holes” DDetection: Mission-Oriented GCSs RRecovery Clarence Bingsheng Wang – CS5214– M & E of CSs6

Effect of IDSs on Reliability Background Optimal setting for IDS techniques  Maximize the security-induced failure time Clarence Bingsheng Wang – CS5214– M & E of CSs7 MMTSF: Mean time to security failure  Reflect the expected system lifetime

Effect of IDSs on Reliability System Model Connectivity-Oriented Mobile Group  Defined based on “Connectivity”  Single Hop: All members are connected  Multi Hops: Separation between groups Clarence Bingsheng Wang – CS5214– M & E of CSs8 Group Partition Failure /Mobility Group Merge

Effect of IDSs on Reliability System Model Mission-Oriented GCSs  Mission execution is an application-level goal built on top of connectivity-oriented group communications Clarence Bingsheng Wang – CS5214– M & E of CSs9

Effect of IDSs on Reliability System Model Secure Group Communications: Broadcast  Group Key  Encrypt the message for Confidentiality  Rekey: Group member Join/Leave/Eviction, Group Partition/Merge  Contributory key agreement protocol: GDH Clarence Bingsheng Wang – CS5214– M & E of CSs10

Effect of IDSs on Reliability Group Member’s Authenticity  Public/Private key pair  Challenge/Response mechanism  Assumption: The public keys of all group members preloaded into every node. No certificate authority (CA) in the MANET during mission period  A node’s public key servers as the identifier of the node Clarence Bingsheng Wang – CS5214– M & E of CSs11

Effect of IDSs on Reliability System Model-IDSs Clarence Bingsheng Wang – CS5214– M & E of CSs12

Effect of IDSs on Reliability System Model-IDSs Clarence Bingsheng Wang – CS5214– M & E of CSs13

Effect of IDSs on Reliability System Model-IDSs Clarence Bingsheng Wang – CS5214– M & E of CSs14 (a) The per-node false negative, and positive probabilities ( 1, and 2) (b) The number of vote-participants, (c) The estimate of the current number of compromised nodes which may collude with the objective to disrupt the service of the system.

Effect of IDSs on Reliability System Model-IDSs Intrusion tolerance  For the selection of participants, each node periodically exchanges its routing information, location, and identifier with its neighboring nodes  Candidates: all neighbor nodes of a target node  A coordinator is selected randomly so that the adversaries will not have specific targets Clarence Bingsheng Wang – CS5214– M & E of CSs15 Coordinator

Effect of IDSs on Reliability System Model-IDSs Clarence Bingsheng Wang – CS5214– M & E of CSs16

Effect of IDSs on Reliability System Model-IDSs Intrusion tolerance  Any node not following the protocol raises a flag as a potentially compromised node, and may get itself evicted when it is being evaluated as a target node.  The vote-participants are known to other nodes, and based on votes received, they can determine whether or not a target node is to be evicted. Clarence Bingsheng Wang – CS5214– M & E of CSs17

Effect of IDSs on Reliability System Model Failure Definition  Definition 1: The failure of any group leads to GCSs’ failure. (SF1)  Definition 2: The failures of all groups lead to GCSs’ failure. (SF2)  Condition 1: a compromised but undetected group member requests and subsequently obtains data using the group key. (C1)  Condition 2: more than 1/3 of group member nodes are compromised, but undetected by IDS (Byzantine Failure model) (C2) Clarence Bingsheng Wang – CS5214– M & E of CSs18

Effect of IDSs on Reliability System Model Network Connectivity, System Failure  Group nodes are connected within a single hop, forming a single group in the system without experiencing group merge or partition events Only a single group in the system, SF1 and SF2 (i.e., the two system failure definitions) are the same.  Group nodes are connected through multi-hops so that there are multiple groups in the system due to group partition/merge events because of node mobility or node failure. Clarence Bingsheng Wang – CS5214– M & E of CSs19

Effect of IDSs on Reliability System Model Reliability Metric: MTTSF  Indicates the lifetime of the GCSs before it fails.  A GCS fails when one mobile group fails, or when all mobile groups fail in the mission-oriented GCS, as defined by SF1 or SF2.  A mobile group fails when either C1 or C2 is true.  A lower MTTSF Implies a faster loss of system integrity, or availability.  The goal is to maximize MTTSF. Clarence Bingsheng Wang – CS5214– M & E of CSs20

Effect of IDSs on Reliability Performance Model Use places to deposit tokens. Use transitions to model events. Tracks the behavior of a single mobile group Tracks the number of mobile groups existing in the GCSs during the system lifetime A transition is eligible to fire when the firing conditions associated with the event are met, including (a) its input places each must contain at least one token, and (b) the associated enabling guard function, if it exists, must return true Clarence Bingsheng Wang – CS5214– M & E of CSs21

Effect of IDSs on Reliability Performance Model SPN Clarence Bingsheng Wang – CS5214– M & E of CSs22

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs23

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs24

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs25

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs26

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs27

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs28

Effect of IDSs on Reliability Performance Model Clarence Bingsheng Wang – CS5214– M & E of CSs29

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs30

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs31

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs32

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs33

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs34

Effect of IDSs on Reliability Parameterization Clarence Bingsheng Wang – CS5214– M & E of CSs35

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs36

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs37

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs38

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs39

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs40

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs41

Effect of IDSs on Reliability Applicability & Conclusion Clarence Bingsheng Wang – CS5214– M & E of CSs42 Attacker Behavior System Failure definitions Operational Conditions

Effect of IDSs on Reliability Applicability & Conclusion Results Clarence Bingsheng Wang – CS5214– M & E of CSs43 m m Node Density m m

Effect of IDSs on Reliability Reference 1. Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng, “Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks,” IEEE TRANSACTIONS ON RELIABILITY, pp. 231 – 241, VOL. 59, NO. 1, MARCH Jin-Hee Cho, “Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks,” PhD. Dissertation, Nov. 12, Clarence Bingsheng Wang – CS5214– M & E of CSs44

Effect of IDSs on Reliability Clarence Bingsheng Wang – CS5214– M & E of CSs45