Sie sind auf Seite 1von 7

(IJCNS) International Journal of Computer and Network Security, 81

Vol. 2, No. 10, 2010

An Efficient Intrusion Detection System for Mobile


Ad Hoc Networks
B.V. Ram Naresh Yadav1, B.Satyanarayana2, O.B.V.Ramanaiah3
1
Dept. of CSE, JNTUHCEJ, Karimnagar, Andhra Pradesh, India.
bvramnaresh@gmail.com

2
Dept. of CST, S.K.University, Anantapur, Andhra Pradesh, India.
bachalasatya@yahoo.com

3
Dept. of CSE, JNTUH College of Engineering, Hyderabad, Andhra Pradesh, India.
obvramanaiah@gmail.com

Abstract: A Mobile ad hoc network is a collection of nodes that all the participants to correctly forward routing and data
is connected through a wireless medium forming rapidly traffic. The routing protocol sets the upper limit to security
changing topologies. Mobile ad hoc network are vulnerable due in any packet network.
to its fundamental characteristics such as open medium,
dynamic topology, distributed co-operation and constrained If routing can be misdirected or modified the entire
capability. Real time Intrusion detection architecture for ad hoc network can be paralyzed [2]. Several efforts have been
networks has been proposed for detecting black hole and packet made to the design of a secure routing protocol for ad hoc
dropping attacks. The main problem with this approach is that
networks. The main problems with this approach are that it
the detection process relies on a state based misuse detection
system. In this case every node needs to run in the IDS agent.
requires changes to the underlying protocol and that manual
This approach does not make use of a distributed architecture to configuration of the initial security associations cannot be
detect attacks that require more than one hop information. In completely avoided.
this paper we propose an Efficient IDS, a novel architecture that
uses a specification based intrusion detection techniques to The Efficient Intrusion Detection Systems for mobile ad
detect active attacks such as packet dropping, black hole attacks hoc network system is based on previous research proposed
against AODV protocol. Our architecture involves the use of to detect active attacks against AODV, a routing protocol
FSM for specifying AODV routing behavior and distributed that is widely used in wireless networks [1]. We have
network monitors for detecting the attacks. Our methods can adopted the successful approach of employing distributed
detect most of the bad nodes with low false positive rate and network monitors for detecting attacks in real time and have
packet delivery ratio can also be increased with high detection
applied to the domain of ad hoc routing. Efficient Intrusion
rate. Efficient Intrusion detection system architecture for ad hoc
detection Systems for mobile ad hoc networks can be
networks does not introduce any changes to the underlying
routing protocol since it operates as an intermediate component characterized as an architecture model for Intrusion
between the network traffic and the utilized protocol with detection in ad hoc networks, while its implementation
minimum processing overhead. We have developed a prototype targets specifically AODV [9].
that was evaluated in AODV enabled networks using the network
simulator (ns-2). We clarify our system as an architecture model since it
does not perform any changes to the underlying routing
protocol but it merely intercepts traffic and acts upon
Keywords: MANET’S, Types of attacks, AODV, IDS. recognized patterns.

1. Introduction In the remainder of this paper we start by briefly


presenting the related work on this area in section 2. In
Mobile Ad hoc networks are one of the recent active section 3 we describe the AODV routing protocol and the
fields and have received spectacular consideration because threat model associated with it. In section 4 we describe in
of their self configuration and self maintenance. Early detail our proposed architecture and the design of Effective
research assumed a friendly and co-operative environment ID for mobile ad hoc network for AODV based networks. In
of wireless network. In order to maintain the connectivity in the section 5 we evaluate our prototype that has been
a mobile ad hoc network all participating nodes have to implemented using ns-2 simulator, section 6 concludes by
perform routing of network traffic. Therefore, a network describing the strengths and short coming of our proposal
layer protocol designed for such self organized networks identifying the directions for future work.
must enforce connectivity and the security requirements in
order to guarantee the undisrupted operations of higher
layer protocols, unfortunately all the widely used ad hoc
routing protocols have no security considerations and trust
82 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

2. Related Work independently and detects intrusions from local traces. Only
one hop information is maintained at each node for each
Specification based intrusion detection system is used to route. If local evidence is in conclusive, the neighboring IDS
detect attacks on AODV. This approach involves the Finite agents co-operate to perform global intrusion detection. The
state machine for specifying correct AODV routing behavior author utilizes misuse detection techniques to reduce the
and distributed network monitors for detecting runtime number of false positives.
violation of the specifications [3]. Specification based
system are particularly attractive as they successfully detect A context aware detection of selfish nodes utilizes hash
both local and distributed attacks against the AODV routing chains in the route discovery phase of DSR and destination
protocol with a low number of false positives. A real time keyed hash chains and promiscuous made of link layer to
intrusion detection system for ad hoc networks model for observe malicious acts of neighboring nodes [11].This
detecting real time attacks has been developed specifically approach introduces a fear based awareness in the malicious
for AODV [2]. The model is composed of four main layers, node that their actions being watched and rated, which helps
a traffic interception module, an event generation module, in reducing mischief in the system. A potential problem of
an attack analysis module, and counter measure module. this system could be mobility of the nodes. Since the
The traffic interception module captures the incoming traffic malicious node can go out of range and again come in the
from the network and selects which of these packets should network with a different IP address. It can still take
be further processed. The event generation module is advantage of the network. Since this method uses
responsible for abstracting the essential information cryptographic mechanisms to detect malicious attacks, it
required for the attack analysis module to determine if there cannot be classified as pure intrusion detection system.
is malicious activity in the network. The event generation
and attack analysis modules are implemented using A specification based intrusion detection system for
TFSM’S. The final component of the architecture is the AODV [3]. It involves the use of Finite State Machines for
counter measure module that is responsible for taking specifying correct AODV routing behavior and distributed
appropriate actions to keep the network performance within network monitors for detecting runtime violation of the
acceptable limits. The result of this research clearly specifications. An additional field in the protocol message is
demonstrates that this approach is used to detect active proposed to enable the monitoring.
attacks in real time. In effective intrusion detection system
for mobile ad hoc networks, we use this work as a basis and 3. AODV Security Problems
apply the developed concepts in the field of ad hoc
networking environment and more specifically to the AODV In this section we present an overview of AODV ad hoc
routing protocol. routing protocol and the threat model associated with it.

The watchdog and path rater scheme has suggested two 3.1 AODV overview
extensions to the DSR ad hoc routing protocol that attempt
to detect and mitigate the effects of nodes that do not AODV can be thought as a combination of both DSR
forward packets although they have agreed to do so [7].The and DSDV [9].It borrows the basic on demand mechanism
watchdog extension is responsible for monitoring that the of Route discovery and Route maintenance from DSR and
next node in the path forwards data packets by listening in the use of hop by hop routing ,Sequence numbers from
promiscuous mode. The path rater assumes the results of the DSDV.AODV is an on demand routing protocol ,which
watchdog and select most reliable path for packet delivery. initiates a route discovery process only when desired by
As the authors of the scheme have identified, the main Source node. When a Source node S wants to send data
problem with this approach is its vulnerability to black mail packets to a destination node D but can not find a route in
attacks. its routing table, it broadcasts a Route Request (RREQ)
message to its neighbors, including the last known sequence
The intrusion detection and response model proposes number for that destination .The neighbors of the node then
a solution to attacks that are caused from a node internal to rebroad cast the RREQ message to their neighbors if they do
the ad hoc networks where the underlying protocol is not have a fresh route to the destination node .This process
AODV [8]. The intrusion detection model claims to capture continues until the RREQ Message reaches the destination
the attacks such as distributed false route requests, Denial of node or an intermediate node that has a fresh enough route.
Service, destination is compromised, impersonation, and
routing information disclosure. The intrusion response AODV uses Sequence numbers to guarantee that all
model is a counter that is incremented wherever a malicious routes are loop free and contain most recent routing
activity is encountered. When the value reaches a predefined information [9]. An Intermediate node that receives a RREQ
threshold, the malicious node is isolated. The authors have replies to it using a route reply (RREP) message only if it
provided statistics for the accuracy of the model. has a route to the destination, whose corresponding
destination Sequence numbers is greater or equal to the one
A cooperative distributed intrusion detection system contained in RREQ. Otherwise, the intermediate node
(IDS) has been proposed in [10] by Zhang and Lee. This broadcasts the RREQ packet to its neighbors until it reaches
method employs co-operative statistical anomaly detection to the destination. The destination unicasts a RREP Back to
techniques. Each intrusion detection agent runs the node that initiated route discovery by transmitting it to
(IJCNS) International Journal of Computer and Network Security, 83
Vol. 2, No. 10, 2010

the neighbor from which it received the RREQ. As RREP,


back to the node that initiated the route discovery by The EIDS Architecture utilizes the use of Finite state
transmitting it to the neighbor from which it received the machines for Specifying AODV routing behavior and
RREQ. As RREP is propagated back to the source, all distributed Network monitors enable the system to detect
intermediate nodes set up forward route entries in their attacks in real time rather than using statistical analysis of
tables. The Route maintenance process utilizes link layer captured traffic. EIDS detects attacks against the AODV
notifications, which are intercepted by neighbors are the one routing protocol in wireless Mobile ad hoc networks. The
that caused the error. These nodes generate and forward Architecture of EIDS is as shown in below figure.
route error (RERR) messages to their neighbors that have
been using routes that include the broken link. In general a Intruder
node may update the sequence numbers in its routing tables S
when ever it receives RREQ, RREP, RERR and RREP-Ack
messages from its neighbors.
Active
Monitor IDS
Network I
3.2 AODV Threat model Traffic

In this Section the most important attacks are presented D


Attacks
that are easily performed by an internal node against AODV
[2, 12].
Figure 1. Architecture of an Efficient Intrusion detection
3.2.1 Sequence number (black hole) Attack Systems

It is a type of Routing attack where a malicious node The EIDS is used to successfully detect both local and
advertise it self as having the shortest path to all the nodes distributed attacks against the AODV routing protocol, with
in the environment by sending a fake route reply. By doing a low number of false positives. It uses Network monitors to
this, the malicious node can deprive the traffic from the trace RREQ and RREP messages in a request reply flow for
source node. It can be used as DOS attack, where it can drop distributed network. A Network monitor employs a FSM for
the packets later. The set up for black hole attack is similar detecting incorrect RREQ and RREP messages. The below
to routing loop attack in which attacker sends out forged fig shows the architecture of a Network monitor.
routing packets. It can set up a route to some destination via
it self and when the actual data packets get there they are
simply dropped forming a black hole where data enters but
not leaves.

3.2.2 Packet dropping Attack

It is essential in ad hoc network that all nodes


participate in the routing process. How ever a node may act
selfishly and process only routing information that are
related to it self in order to conserve energy. This behavior
or attack can create network instability or even segment the
network.

3.2.3 Resource Consumption Attack

In this attack, the malicious node attempt to consume Figure 2. Architecture of a Network Monitor
both the network and node resources by generating and
sending frequent un necessary routing traffic. The goal of Networks monitors are used to detect incorrect RREQ
this attack is to flood the network with false routing packets and RREP messages by listening passively to the AODV
to consume all available network bandwidth with irrelevant routing messages. A request reply flow can be uniquely
traffic and to consume energy and processing power from identified by the RREQ ID, the source and destination IP
the participating nodes. addresses. Messages are grouped based on the request-reply
flow to which they belong
There are several other similar attacks presented in the
literature [4, 5, 6]. They exploit more or less the same A network monitor employs a finite state machine
routing protocol vulnerabilities to achieve their goals. (FSM) for detecting incorrect RREQ and RREP messages. It
Sequence number attack is specific to AODV, while the maintains a Finite state machine for each branch of a
other two can be applied to any routing protocol. request-reply flow. A request flow starts at the Source state.
It transmits to the RREQ Forwarding state when a source
4. Efficient Intrusion detection system Architecture node broadcasts the first RREQ message (with a new REQ
ID). When a forwarded broadcasting RREQ is detected, it
84 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

stays in RREQ Forwarding state unless a corresponding


RREP is detected. Then if a unicasting RREP is detected, it Table 1: Simulation Parameters
goes to RREP Forwarding state and stays there until it
reaches the source node and the route is set up. If any Parameter Value
suspicious fact or anomaly is detected, it goes to the
suspicious or alarm states. Simulation(Grid) area 1000*1000m

Simulation duration 900 seconds


Number of mobile hosts 30
Type of Packet Traffic CBR
Maximum Speed 20 m/sec
Node Mobility Random way point
Transmission range 250m
Routing Protocol AODV
MAC Layer 802.11,Peer to Peer
Dropped Packet time out 10 seconds
Dropped Packet Threshold 10 packets
Clear delay 100 seconds
Host Pause time 15 seconds
Modification Threshold 5 events
Figure 3. Finite State Machine Diagram Neighbor hello period 30 seconds

The following are the metrics that we chosen to evaluate


the impact of implemented attacks. (1) False Positives (2)
detection Rate (3) Packet delivery ratio (4) Routing packet
dropped ratio. These metrics were used to measure the
severity of each attack and the improvement that Effective
IDS manages to achieve during active attacks. Every point
in the produced graphs is an average value of data collected
from repeating the same experiment ten times in order to
achieve more realistic measurements.

5.1 Sequence number (black hole) Attack


Figure 4. Suspicious and Alarm State Machine Diagram
Detection

When a Network Monitor compares a new packet The four metrics that were used in the evaluation of
with the old corresponding packet, the primary goal of the Sequence number attack detection and counter mechanisms
constraints is to make sure that the AODV header of the are the delivery ratio, the number of false routing attacks
forwarded control packet is not modified in an undesired sent by the attacker, false positive and detection rate.
manner. If an intermediate node responds to the request, the
Network monitor will verify this response from its
forwarding table as well as with the constraints in order to
make sure that the intermediate node is not lying. In
addition, the constraints are used to detect Packet drop and
spoofing.

5. Evaluation

The experiments for the evaluation of effective


Intrusion detection systems for mobile ad hoc networks were
carried out using the network simulator (ns-2).we have
evaluated AODV with out any modifications, AODV with
one malicious node present and AODV with the Effective
IDS component enabled having in the network a malicious
node. The Scenarios developed to carry these tests use as
parameters the mobility of the nodes and the number of
active connections in the network. The choices of the
Figure 5. Packet Delivery ratio against Number Of
simulator parameter that are presented in Table 1 consider
connections
both the accuracy and the efficiency of the simulation.
(IJCNS) International Journal of Computer and Network Security, 85
Vol. 2, No. 10, 2010

The second metric that was used in the evaluation of


this attack was the number of false packets sent by the
attacking node versus the number of active connections and
the node mobility. This metric was used to examine the
overhead of the sequence number attack and we considered
only the extra cost on communication imposed by the attack.
We observed that the average number of RREP sent by the
malicious node in all the experiments was 1856 and the
number of nodes that inserted the false route into their
routing table was 20 out of 30. In figure 7, false positives are
nodes incorrectly labeled as malicious. As expected, the
performance of Active response protocol improved with
respect to false positives as the density of the malicious
nodes increased.

Figure 8 shows the detection rate. In the best case, 93%


of the attacks can be detected, Where as, the worst case
Figure 6. Packet Delivery ratio against Speed of Nodes detection rate is 80%. There are several reasons why a bad
node may go undetected. First, the bad node may not be in
any path in the routing cache each time when the monitors
begin to check. Since the paths are based solely on the paths
maintained by the routing cache, if a node is not contained
in any path, its forwarding function will not be monitored.
Second, there may be two consecutive bad nodes in a path
bad behavior of one node is hidden by the other bad node.

5.2 Packet Drop Attack Detection

To evaluate this attack, the metrics chosen were delivery


ratio and routing overhead ratio. The following graphs show
the Performance.

Figure 7. Percentage of False Positives Against Percentage


of bad nodes

Figure 9. Packet Delivery ratio against Number of


Connections

Figure 8. Percentage of Detected bad Nodes against


Percentage of bad nodes

In figures 5 and 6 delivery ratio is plotted as the node


mobility or density increases. The normalized overhead of
AODV is 2-4 times more when the network is loaded. In the
graphs, the overhead of AODV is considered with a fully
loaded network. as it can be seen from the graph, with
EIDAODV running, delivery ratio is increased by as much Figure 10. Packet Delivery ratio against Speed of Nodes
as 72%.
86 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

Sequence Number Attack, Packet Dropping Attack with


Incremental Deployment. The method has been shown to
have low overheads and high detection rate.

Our Intrusion Detection and Response Protocol for


MANET’s have been demonstrated to perform better than
the ones proposed by Stamouli in terms of false positives
and percentage of packets delivered. Simulation results
validate the ability of our protocol to successfully detect both
local and distributed attacks against the AODV routing
protocol, with a low number of false positives.

References

[1] Stamouli, P.G.Argyroudis, H.Tiwari, “Real time


Intrusion detection for ad hoc networks”, Proceedings
of sixth IEEE Symposium on a world of wireless mobile
Figure 11. Percentage of False Positives against and multimedia networks, (WOWMOM), 2003.
Percentage of bad nodes [2] W.Wang, Y.Lu and B.K.Bhargava “on vulnerability
and protection of ad hoc on demand distance vector
protocol”, Proceedings of international conference on
Figure 9 shows that EIDAODV system improves the telecommunications, 2003.
delivery ratio by 51% compared to plain AODV. Figure 10 [3] TSENG, CHIN-YANG, et al “A specification based
shows that the routing overhead introduced by the attack Intrusion detection system” for AODV in proceedings
reduces by 52%. EIDAODV reduces the routing overhead of 1st ACM workshop on security of ad hoc and sensor
ratio to approximately the levels that normal AODV networks. (SAS.N ’03), Fair fax, V.A 2003.
demonstrates. In Figure 11 we see that the performance of [4] HUY.C, Pevirgn.A, and Johnson, D.B.Ariadane., “A
active response protocol improves with respect to false secure on demand routing protocol for ad hoc
positives as the density of malicious nodes increases. Figure networks”. In eight ACM international conference on
12 shows that in the best case, 93% of the bad nodes can be mobile computing and networking (Mobicom2002),
detected. The worst-case detection rate is 77%. September 2002.
[5] Stajanos.F and Anderson.R. “The Resurrecting
Duckling: security issues for ad hoc wireless networks,
7th international workshop Proceedings, 1999.
[6] C.Sivarama murthy, B.S Manoj, “Ad hoc wireless
networks: Architectures and protocols”, Princeton hall,
May 2004, New Jersey, USA.
[7] Seri go Marti, Thomas J.Givli, Kerenlai, Mary Baker,
“Mitigating routing Mis behavior in mobile ad hoc
networks”., Proceedings of MOBICOM, 2000.
[8] S.Bhargava, D.P.Agarwal, “security enhancement in
AODV protocol for wireless ad hoc networks” in IEEE
semi annual proceedings of vehicular technology
conference (VCT’01), 2000.
[9] Charles E.perkins, “ad hoc on demand distance vector
on (AODV) routing”, Internet draft, draft-ilet-manet-
aodv-01.txt August 1998.
[10] Y .Zhang, W.Lee, Y.Huang. “Intrusion detection for
Figure 12. Percentage of Detected bad nodes against wireless Ad hoc networks”. In Mobile Networks and
Percentage of bad nodes applications, ACM 2002.

6. Conclusions [11] P.Papadimitratos, Z.J.Han, “Security routing for Mobile


Ad hoc networks”, in the proceedings of the SCS
An Effective Intrusion Detection System aiming at communication Networks and Distributed systems,
securing the AODV protocol has been developed using Modeling and Simulating conference (CNDS’02),
specification-based technique. It is based on a previous work January 2002.
done by Stamouli. The EIDS performance in detecting [12] V.Madhu, A.A .Chari, “An approach for detecting
misuse of the AODV protocol has been discussed. In all the attacks in mobile ad hoc networks”, Proceedings of
cases, the attack was detected as a violation to one of the journal of computer science 2008.
AODV protocol specifications. From the results obtained, it [13] Perkins, C.E. Rayer, E.M. Das. S, “Ad hoc on demand
can be concluded that our EIDS can effectively detect distance vector routing”, RFC 3651 (2003).
(IJCNS) International Journal of Computer and Network Security, 87
Vol. 2, No. 10, 2010

Author’s Profile

B.V.RamNaresh Yadav is working as a


Research Scholar in CSE Department of JNT
University, Hyderabad, Andhra Pradesh, India.
His Area of interests includes Network
security, Compliers, Computer Networks.

Dr B. Satya Narayana is working as a Professor


in Department of CST of S.K.University,
Anantapur, Andhra Pradesh, India. His Area of
interests include Network security, Data ware
Housing and Data Mining, Computer Networks
and Artificial Intelligence.

Dr.O.B.V.Ramanaiah is working as a Professor


in CSE Department of JNT University,
Hyderabad, Andhra Pradesh, India. His Area of
interests includes Mobile Computing,
Computer Networks and Operating Systems.

Das könnte Ihnen auch gefallen