Sie sind auf Seite 1von 6

Sindh Univ. Res. Jour. (Sci. Ser.) Vol.

43 (1-A) 91-96 (2011)

SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)

COINS: Towards a Correlation Based Intrusion Detection System for Mobile Ad hoc Network

N. Islam1, Z. A. Shaikh1 and Aqeel-ur-Rehman2


1,
National University of Computer and Emerging Sciences, Karachi, Pakistan
2
Hamdard University, Karachi, Pakistan
noman.islam@nu.edu.pk; zubair.shaikh@nu.edu.pk; aqeel.rehman@nu.edu.pk
Corre
rev

Abstract: Mobile Ad-hoc Networks (MANET) encounters significant amount of security challenges due to their peculiar
properties. To address these security challenges, this paper presents an approach towards secure data management in
MANET. It presents an ingenious strategy based on the relationships among data items discovered via association rules
mining algorithm. The proposed strategy assumes that the requests propounded by a particular host in a session are
dependent on their underlying relationships and digression from these relationships should be regarded as abnormalcy.
Based on this theory, a Correlation Based Intrusion Detection System (COINS) for MANET has been presented. The
proposed solution considers the associations among requests of a session to establish the integrity of session and
consequently of the data consumers. An analysis of the proposed scheme has been done under different scenarios that
signifies the effectiveness of the proposed scheme.

Keywords- Correlation; MANET; IDS; Security; Secure Data Management

INTRODUCTION However, the flexibility of the MANET comes


A. Problem Introduction with the onset of an array of newer challenges. These
Mobile Ad hoc Networks are characterized as challenges are because of the improvised nature, low
infrastructure-less network G(N,E) with a set of nodes resources, heterogeneous temperament etc. As a result,
N={n1,n2,n3,} and a set of links E={e1,e2,e3,} and ei various academic and research circles are actively
NN. The infrastructure-less nature of MANET and involved in addressing various issues of MANET. These
effort-less deployment foster a range of potential research issues consist of physical layer issues
applications (Shaikh 2008; Shaikh et al., 2008; Shaikh (i.e. MAC Layer protocols, power management),
et al., 2010). communication layer (i.e. routing, transport protocols)
and application layer issues (i.e. service discovery,
Table 1: A Summary of Research Issues of MANET query processing) etc. (Table 1) provides a summary of
Problem Issues / Description Solutions these features of MANET.
exploits various modes Among the issues discussed in table 1, security
Power
low powered battery of battery i.e. doze,
Management is considered as the essential component of any
sleep, active
AODV MANET application. There have been a number of
stale routes
Routing
routing loops
DSR customary solutions for providing security in
DSDV conventional systems. These solutions include
Coordinated Effort at all
QoS links instability layers, (Brahma, Kim cryptographic algorithms, hashing schemes, message
et al., 2005) authentication codes etc. However, these old techniques
no DHCP cant be simply plugged in MANET environments.
Addressing DoS attack on address Mobile IP These algorithms tumbles in MANET because of the its
spaces
frequent link failure
dynamic and infrastructure-less environment. The
Transport resource constrained and unreliable mobile nodes also
considered as TCP variants
Protocol
congestion pose considerable challenges. Additionally, unstable and
open for all asymmetric links of MANET demands proper attention
no dedicated security Threshold cryptography towards the design of any security algorithm for
Security
servers IDS
alien environment MANET. (Table 2) summarizes these security
hidden node problem (Brahma, Kim, et al. , challenges of MANET in contrast with the traditional
MAC Layer
exposed node problem 2005) systems.
The objective of this paper is to provide a requests made by all the nodes of the network. Before
secure data management solution for MANET. Data proceeding towards the details, we will first present the
Management is a set of mechanisms essential to ensure literature related to our work.
that the end user can consume the data it desires in
pervasive fashion. B. Literature Review
Table 2: Security Challenges in MANET
(Fig. 1) highlights the current research work on
security in MANET that includes: protecting MAC
Conventional
Characteristics MANET layer, secure routing Intrusion Detection System and
Network
Nodes Characteristics cryptographic scheme. At the link layer, a number of
Mobility +
approaches like extensions to IEEE 802.11 MAC
(Kyasanur and Vaidya 2003) and IEEE 802.11 WEP
Resource +
have been proposed (IEEE 2002). As routing layer of
Reliability +
MANET is vulnerable to a range of security attacks, a
Links Characteristics
number of secure routing protocols have been proposed
Links
at the networking layer. This includes (Michiardi and
Bandwidth + Molva 2004): Secure Routing Protocol, ARIADNE,
Symmetry + ARAN and SEAD etc. A number of public and private
Stability + key cryptographic security schemes are also cited in
Environment Characteristics literature (Luo and Lu 2002; Capkun, Buttyn et al.,
Environment 2003). In (Zhou and Haas 2002), a threshold
Dynamism + cryptography based approach has been presented for key
Infrastructure + management in MANET.
Certification +
Authority Intrusion Detection System (IDS) is another
DHCP + way of protection that recognizes a vicious entity on the
Interoperability + network based on known signature patterns (misuse
Nodes + detection) or users activities (anomaly detection)
Acquaintance (Zhang and Lee 2000; Anantvalee and Wu 2007). In
(Shaikh 2007) an IDS security architecture based on
Formally, if D={d1,d2,d3,} represents the set
Mobile Agents is proposed. The authors employ various
of data prevailing on the network and represents the types of mobile agents for topology management and
alphabet i.e. di , then data management is defined as: intruders identification etc. A centralized entity is
(1) elected from the participating nodes on the network that
launches a mobile agent upon onset of any node on the
In MANET, the problem of providing security network. The mobile agent performs various security
of data management operations is not a straightforward checks on the new host to confirm this node as a well-
job because of the new challenges that arise in MANET behaving node and then grants network access to this
as mentioned in table II. To cope with these challenges, node. In (Yan, et al., 2004) an IDS solution by
this paper presents a security solution by extending our establishing a correspondence with human immune
earlier proposed data management solution(Islam 2008; system is offered. Mobile Agents are launched similar to
Islam and Shaikh 2008; Islam and Shaikh 2009; Islam, antibodies in human systems upon arrival of any
Shaikh et al., 2010). The solution is an Intrusion unrecognized entity on the network. In (Lee, et al.,
Detection System based on the isolation of an intruding 2003) a cooperative intrusion detection scheme has been
node from the network considering the data requests proposed that identifies anomalies by a node in the
made by the particular node. Let fS signifies a function network based on pattern classification techniques.
that defines the character of a node i on the basis of its
requests dijD. Then fs can be expressed as: As far as the data management frameworks are
concerned, it includes: MoGATU (Joshi, et al., 2006),
DRIVE (Xu and Wolfson 2005) and (Islam 2008; and
(2)
Shaikh 2008; and Shaikh 2009; Shaikh et al.,2010).
MoGATU is a data management framework based on
The function fs identifies a misbehaving node
the cross-layer mechanisms that addresses various issues
on the network based on its activities deviating from the
of data management like discovery, caching, query
normal pattern. The normal patterns are determined by
processing and security etc. In (Perich, et al., 2006;
applying association rules mining algorithm on the past
Joshi, et al., 2006), a trust management scheme is
proposed for MoGATU based on query packs that where, represents a small threshold and dij.t
embraces information about reliable data sources and represents the time of issuance of the request dij.t. The
mechanisms to identify and react to malicious activity in log database L can be represented as:
proactive and reactive fashion. DRIVE(Xu and Wolfson
2005) is an incentive based opportunistic approach to L= {H1, H2, H3,} (4)
data management system for vehicular environments.
(Islam 2008; Shaikh 2008; and Shaikh 2009; Shaikh The log database is used by association rules
et al., 2010) is a data management framework based on mining component to calculate the correlation among
exploiting network layer capabilities and association data items. This correlation is used by the component
rules mining for performing various aspects of data COINS to establish the request patterns of a normal
management. This paper extends this framework further behaving nodes and thus a misbehaving node can be
by plugging a security module that exploits existing identified on the basis of their request sessions.
components for performing detection of an intruder on
the network.
Service Discovery Component Service Catalog

MAC Layer Routing Layer


IEEE 802.11 SRP
MAC(Kyasanur and ARIADNE Association Rules Mining Log Database
Vaidya 2003) ARAN
IEEE 802.11 WEP
(IEEE 2002)
COINS
IDS Cryptography
Intrusion Intrusion
Detection Response

Agent Based(Shaikh Threshold


and Shaikh 2007) (Zhou
Cryptography
Human Model and Haas 2002) Normal QoS delivery
Based(Ping, Yan et Marked as doubtful
al. 2004) Packet dropped

Fig. 1: A Summary of Security Approaches for MANET Fig. 2: Block Diagram illustraing the propsed
scheme
MATERIALS AND METHOD
COINS component itself comprises of two sub-
(Fig. 2) highlights the major component of our components: the intrusion detection and intrusion
proposed data management framework where the response components that are used for descrying and
proposed components for security are contrasted from penalizing intruders on the network.
existing components. There are a number of components
like discovery, catalog, data mining, logging and C. Intrusion Detection Component (IDC)
correlation based security management etc. The service
discovery component accomplishes the task of The Intrusion Detection Component (IDC) is
discovering the services, data and other resources from responsible for recognizing intruding activities on the
the network on the basis of a request floated by a network. IDC works by calculating the deviation count
consumer. The service catalog maintains the list of for a particular session. If the deviation count gets above
services/data/resources etc. available on the network. a particular threshold, integrity of the session becomes
This also includes the meta-information to describe the questionable.
services hosted by the node. The log database has the
history of requests issued by consumers in the past in the Let dc denotes the deviation count of a request
form of sessions. A session can be defined as data session Hi={di1,di2,di3,,dih}. For a particular request
requests in a sequence posed by a data consumer. A dij, the deviation count can be estimated by the
session Hi maintained by a node ni can be expressed as: intrusion detection component as follows:

(3)
(5)
where, denotes the correlation between a and b. operates in three modes: QoS packet delivery, packet
marking and packet dropping. For a well-behaving node,
represents a threshold value. The deviation count is it forwards the packet using simple QoS based delivery
an estimate of how much a particular session behaves mechanism. In case of any doubtful node, it can mark
differently from the sessions maintained by other nodes the packet as of skeptical nature, while for an intruding
in the past. If a particular session deviation count node, its packet can simply be dropped. (Fig. 3)
exceeds a threshold , the session can be marked as a describes the working of proposed security scheme.
malicious and the owner of the session can be regarded a Upon instantiation, the DataManagement class starts its
malicious node. The integrity of session I estimated by various sub-components (e.g. log database, mining etc.).
the intrusion detection module can thus be expressed as The dataRequest method outlines how a request for any
follows: data item is handled by the data management
component. It first performs the security measures by
(6) calling the applySecuirtyCheck method of COINS. It the
class DataManagement { request passes all security checks, it is logged and
ServiceDiscoveryComponent discovery; corresponding response is generated. The COINS class
AssociationRulesMining mining;
LogDatabase log; sketches the working of our proposed security scheme.
ServiceCatalog catalog; The hash table dc maintains the deviation count of
COINS coins;
various consumers where as the hash table
public DataManagement() { sessionhistory maintains the requests made by a
//start various components
particular consumer in a session. The method
coins = new COINS(); applySecurityCheck performs various security checks to
}
confirm the integrity of session. It compares the session
public void dataRequest(Request d){
coins.applySecurityCheck(d);
history of the requests consumer with the mining results
log.logDataRequest(d); computed by the mining component. If there is no
If(!catalog.contains (d)) { similar pattern found, it is regarded as intrusion and a
discovery.discover(d);
} message is sent to adjacent nodes on the network.
// consume requested item
3 4 5 7
} 3 4 5 8
4 5 7 8
class COINS {
3 5 7 8
Hashtable dc = new Hashtable();
Hashtable sessionHistory = ne wHashtable(); 3 4 6 10
public void applySecurityCheck (Request d) { 6 7 8 10
// for a new consumer, a new session is created 6 10 11 12 13
If(dc.get(d.consumer) == null) { a: Frequent Item sets
dc.put(d.consumer,0);
}
sessionHistory.put(d.consumer,d); 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
if
(!mining.MiningResults.contains(sessionHistory)) { 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
int old_dc = dc.get(d.consumer); 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
old_dc++;
dc.put(d.consumer,old_dc); 3 0 0 0 1 1 0 1 0 0 0 0 0 0 0 0
}
4 0 0 1 0 1 0 1 1 0 0 0 0 0 0 0
if(dc.get(d.consumer) > threshold) {
//signal an intruding session 5 0 0 1 1 0 0 1 1 0 0 0 0 0 0 0
Message m = new Message();
m.setText(consumer + d.consumer + is an 6 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0
intruder); 7 0 0 1 1 1 1 0 1 0 0 0 0 0 0 0
send(m, getAdjoiningNodes());
performIntrusionResponse(); 8 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0
}
} 9 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
}
} 10 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0

11 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Fig. 3: Pseudo Code illustrating the working of COINS 12 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

D. Intrusion Response 13 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1

The Intrusion Response Component (IRC) has 14 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0

the job of countering any type of intrusion in the 15 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0

network. One of the key properties of MANET is multi- b: Correlation Matrix


hop routing. The response component works by simply
ignoring the packets of any malicious nodes thus Fig. 4: Frequent Item sets computed by FP-Growth
isolating the malicious node from the network. It Algorithm
RESULTS AND DISCUSSION F. Discussions on Implementation
E. Results and Analysis
This paper presents an approach towards
In this section, we will briefly analyze the intrusion detection based on association rules mining
effectiveness of COINS under Denial of Service (DOS) algorithm. The paper provides a brief analysis of the
and provide the discussions on implementation. A scheme under few basic scenarios. However, a thorough
thorough evaluation of the scheme is left as a future investigation is necessary to truly validate the proposed
work. To evaluate the efficacy of proposal, FP-Growth scheme. We now present a brief discussion on the
Association Rules Mining algorithm(Islam and Shaikh implementation aspects essential for a comprehensive
2009) has been applied on a campus data requests for evaluation of COINS.
You Tube videos(Zink, Suh et al., 2008). (Fig. 4)
illustrates some of the frequent item sets discovered by A plenary examination of COINS primarily
the algorithm. Suppose the threshold value is 5. Let demands its implementation on a real world setup (e.g.
={1,2,3,,13} and a,b. Following cases analyze (Perich, Joshi et al., 2006) (Xu and Wolfson 2005) and
the behavior of COINS under various types of attacks. (SunMicrosystems 2001) etc.) or a in a simulation
environment (e.g. JIST (Barr, Haas et al.,2004)). The
Case 1 (Sequence Repeat): second question is the implementation of various sub-
Let the intruder floats the queries with the following pattern: components of COINS. This includes the selection of
(a . b) * appropriate data structures and algorithms for service
Let a=3 and b=4, then following is the response of COINS: discovery, caching and logging etc. Some of these
Request DC Response aspects have been highlighted in (Shaikh et al.,2008;
3 0 Shaikh et al., 2009; Shaikh et al.,2010) etc.
34 0 For an intensive inquiry of COINS, its
343 1 responses under various types of security attacks like
3434 2 DDOS attacks, Worm Hole attacks, Black Hole attacks,
34343 3 Rushing attacks and Jelly Fish attacks etc. must be
343434 4 investigated. The signatures of these attacks can be
3434343 5 malicious session detected utilized to generate malicious sessions and the response
Case 2 (Selective Repeat): of COINS can be observed against these attacks. In
Let the intruder floats the queries with the following pattern: particular, the proportion of false intrusion alarm
(a | b) * (i.e. the identification of a node as intruder when it is a
well-behaving node) should be examined.
If a=3 and b=4, following is the response of COINS:

Request DC Response CONCLUSION


3 0 We fold the discussion by pointing out some of
34 0 the areas where further research can be sought. The
344 1 existing association rules mining algorithm has high
3443 2 computational and memory demands. In this regards,
34434 3 approximate algorithms can be crafted that can cope
344343 4
with the minimal resources of the node and also tells the
correlation among data items. The proposed intrusion
3443433 5 malicious session detected
response module also demands further deliberation and
Case 3 (Random Repeat): analysis. The researchers can also steer their efforts
Let the intruder floats the queries on the basis of following
towards the exploitation of correlation information for
pattern: other operations of data management like replication,
* query processing and optimization, etc.
Following is the response of COINS: ACKNOWLEDGMENT
Request DC Response This manuscript is an extended version of our
3 0 earlier paper that has been published in proceedings of
31 1 conference International Conference on Computers &
312 2 Emerging Technologies (ICCET 2011), that was held
3 1 2 11 3 on 22-23 April 2011 at Shah Abdul Latif University,
3 1 2 11 5 3 Khairpur, Sindh, Pakistan. We would also like to
3 1 2 11 5 12 4 acknowledge Higher Education Commission (HEC),
3 1 2 11 5 12 13 5 malicious session detected Pakistan for their support in this research work.
REFERENCES Project Exhibition (E-Indus 2008) Institute of Industrial
and Electronics Engineering, Karachi, Pakistan.
Abbasi, A. Z. and Z. A. Shaikh (2008) "Building a
Smart University Using RFID Technology". Kyasanur, P. and N. H. Vaidya (2003) "Detection and
International Conference on Computer Science and handling of MAC layer misbehavior in wireless
Software Engineering (CSSE 2008), Wuhan, China. networks". International Conference on Dependable
Systems and Networks (DSN'03), San Francisco,
Anantvalee, T. and J. Wu (2007) "A survey on intrusion
California.
detection in mobile ad hoc networks." Wireless
Network Security: 159-180. Luo, H. and S. Lu (2002) "Ubiquitous and robust
Aqeel-ur-Rehman, Z. A. Shaikh, (2010) "An Integrated authentication services for ad hoc wireless networks",
Framework to Develop Context--Aware Sensor Grid for UCLA Computer Science Department.
Agriculture." Australian Journal of Basic and Applied Michiardi, P. and R. Molva (2004) "Ad hoc networks
Sciences 4(5): 922-931. security". Mobile ad hoc networking. (1): 275297.
Barr, R., Z. J. Haas, (2004) "JIST: Embedding Patwardhan, A., F. Perich (2006) "Querying in packs:
simulation time into a virtual machine". EuroSim Trustworthy data management in ad hoc networks."
Congress on Modelling and Simulation. International Journal of Wireless Information Networks
Brahma, M., K. W. Kim, (2005) "A new approach for 13 (4): 263-274.
supporting QoS in MAC layer over MANETs".
Perich, F., A. Joshi (2006) "Data Management for
Systems Communications, Montreal, Canada.
Mobile Ad-Hoc Networks." Enabling Technologies for
Capkun, S., L. Buttyn, (2003) "Self-organized public- Wireless E-Business: 132-176.
key management for mobile ad hoc networks." IEEE
Transactions on mobile computing: 52-64. Ping, Y., Y. Yan, (2004) "Securing ad hoc networks
through mobile agent". 3rd international conference on
IEEE (2002) "Wireless Medium Access Control and Information security, New York, USA, ACM.
Physical Layer (PHY) Specifications: Specification for
Enhanced Security." IEEE Std. 802.11i/D30. Shaikh, R. A. and Z. A. Shaikh (2007) "A Security
Architecture for Multihop Mobile Ad hoc Networks
Islam, N. (2008) "A Data Management Framework for With Mobile Agents". 9th International Multitopic
Mobile Ad hoc Networks (MANET)". Doctoral Conference, IEEE INMIC 2005 Karachi, Pakistan,
Symposium on Research in Computer Science, IEEE.
University of Central Punjab, Lahore, Pakistan.
Sun Microsystems (2001) "Jini Technology Core
Islam, N., G. A. Mallah, (2010) "FIPA and MASIF
Platform Specification, version 1.2".
standards: a comparative study and strategies for
integration". National Software Engineering Xu, B. and O. Wolfson (2005) "Data management in
Conference, Rawalpindi, Pakistan, ACM. mobile peer-to-peer networks." Databases, Information
Systems, and Peer-to-Peer Computing: 1-15.
Islam, N., N. A. Shaikh, (2010) "A Network Layer
Service Discovery Approach for Mobile Ad hoc Zhang, Y. and W. Lee (2000) "Intrusion detection in
Network Using Association Rules Mining." Australian wireless ad-hoc networks". 6th annual international
Journal of Basic and Applied Sciences 4(6): 1305-1315. conference on Mobile computing and networking,
Islam, N. and Z. A. Shaikh (2008) "A Novel Approach New York.
to Service Discovery in Mobile Adhoc Network".
International Networking and Communications Zhang, Y., W. Lee, (2003) "Intrusion detection
Conference, Lahore University of Management and techniques for mobile wireless networks." Wireless
Science, Lahore, Pakistan. Networks 9 (5): 545-556.

Islam, N. and Z. A. Shaikh (2009) "Service Discovery Zhou, L. and Z. J. Haas (2002) "Securing ad hoc
in Mobile Ad hoc Networks Using Association Rules networks." Network, IEEE 13 (6): 24-30.
Mining". 13th IEEE International Multitopic
Conference 2009 (INMIC-2009), Islamabad, Pakistan. Zink, M., K. Suh, (2008) "Watch global, cache local:
YouTube network traffic at a campus network-
Islam, N., Z. A. Shaikh, (2008) "Towards a Grid-based measurements and implications." Proceeding of the
approach to Traffic Routing in VANET". 8th IIEE- 15th SPIE/ACM Multimedia Computing and
IEEE Student Branch Annual Student Seminar and Networking (MMCN08).

Das könnte Ihnen auch gefallen