75
Detecting service violation Detecting service violation in Internet and mobile ad in Internet and mobile ad hoc networks hoc networks Bharat Bhargava CERIAS security center and Department of computer sciences Purdue University [email protected] www.cs.purdue.edu/people/bb Joint work with A. Habib, Y. Lu, X. Wu, and W. Wang

Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

Detecting service violation Detecting service violation in Internet and mobile ad in Internet and mobile ad

hoc networkshoc networksBharat Bhargava

CERIAS security center andDepartment of computer sciences

Purdue [email protected]

www.cs.purdue.edu/people/bbJoint work with A. Habib, Y. Lu, X. Wu, and

W. Wang

Page 2: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

2

Problem StatementProblem Statement

• Detecting service violation in networks is the procedure of identifying the misbehaviors of users or operations that do not adhere to network protocols.

Page 3: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

3

ContributionsContributions• Infer internal behaviors based on SLA

parameters• Advance probing technology• Advance Intrusion Detection, QoS and

DiffServ, intruder identification, and Fault-tolerant authentication

• Integrate cellular networks with ad hoc networks to– Enable cellular providers to add services– Ad hoc networks get central trusted authority

• Enable the deployment of security sensitive applications

Page 4: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

4

Example of service violationExample of service violation• In Internet:

–DoS attacks, exploit known vulnerabilities that make victim un-operable, flood network

–Attacks/ Service Violations in QoSdomains

• Impersonate a legitimate customer by spoofing flow identity

• Mark Packets to a higher class of services

• Bypassing the ingress routers and using best effort traffic.

Page 5: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

5

Example of service violationExample of service violation• In cellular networks:

– Cellular user impersonation– Control channel spoofing and jamming

• In mobile ad hoc networks– Node misbehaviors (selfish, malicious, mal-

functioning, compromised node, Byzantine behavior)

– Passive attacks (eavesdropping)– Node impersonation and gang attack– DoS and link layer flood– Energy depletion attacks

Page 6: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

6

ContentContent• Research motivation• Classification of attacks and detection

mechanisms• Network topology• Examples

– Detecting service violation by distributed monitoring [NSF ITR-ANIR, IBM]

– Intruder identification in mobile ad hoc networks [CISCO]

– Fault tolerant Authentication in movable base station [NSF CCR]

– Cellular assisted mobile ad hoc networks (in progress) [Motorola]

• Conclusion

Page 7: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

7

Research MotivationResearch Motivation• The hybrid of Internet, cellular system and

mobile ad hoc networks introduce more vulnerabilities. [S. Bush, GE Research ’99]

• The popularity of mobile system puts difficult requirements for security [Hubauxet al, MobiCom ’01]

• The release of National Strategy to Secure Cyberspace [Pres G. W. Bush, ‘02 ]

Page 8: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

8

Research MotivationResearch Motivation

• Vulnerabilities allows attacks to cause threat to assets

• Adapt to type, duration, extent, and severity of attack

• Need to reduce threat and risk• Observe, analyze, alert, avoid, and

tolerate attacks and deal with threat

Page 9: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

9

Monitoring network activities to deal Monitoring network activities to deal withwith

• Outside attacks…– 13,000 DoS attacks recorded in 3 weeks!!,

Some attacks last for hours!! [Moore et al., Usenix ’01]

– Can network monitoring alert for possible DoS attacks in early stages

• QoS-enabled networks have inside attacks like Stealing bandwidth by– Marking packets with higher priority classes– Spoofing flow ID

Page 10: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

10

Fundamental NotionsFundamental Notions

• Vulnerabilities and threats• Adaptability• Trust• Fault-tolerance and security• Observe misbehavior flows through

service level agreement(SLA) violation detection at the–Core routers–Edge routers–Link layer

Page 11: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

11

Ideas from Distributed SystemsIdeas from Distributed Systems

• Distance vector• Sequence number• Replication• Atomicity• Election protocols

Page 12: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

12

MeasuresMeasures

• Efficiency: communication and processing overheads

• Accuracy• Effectiveness• Robustness

Page 13: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

13

Defeating Defeating DoSDoS attacks in Internetattacks in InternetDoS Attacks

Detection

TracebackFiltering

Ingress/Egress Filtering

Packet Marking

SPIE ICMP Edge based

Deterministic Probabilistic

Core based

Monitoring

Prevention

Route−based

Stripe Distributed

Page 14: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

14

Attacks on routing in mobile ad hoc Attacks on routing in mobile ad hoc networksnetworks

Attacks on routing

Active attacks Passive attacks

Packet silent discard

Routing information hiding

Routing procedure

Flood network

Route request

Route broken message

False reply Wormhole attacks

Page 15: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

15

Attacks on Cellular systemAttacks on Cellular system

SSLSOCKSRADIUS

IPSecurity

Security in 3G cellular network

Access security

Network and system security

Mutual Authentication

Cryptography for authenticationTemporary identitiesUTRAN encryption

Integration protection forRRC signaling

Applicationlayer

Session Layer

Networklayer

S-MINEPGPSET

Page 16: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

16

Topology Used (Internet)Topology Used (Internet)

A1 spoofs H5’s address to attack V

A3 uses reflector H3 to attack V

H5

Victim, V

Page 17: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

17

Topology Used (Cellular assisted Topology Used (Cellular assisted system)system)

Base station (BS)

CAMA agent

Cellular Backbone

Cellular Backbone

Cell

Ad hoc network

Cell

:Ad hoc channel

:Cellular channel for cellular traffic

: Cellular channel for ad hoc control

: Mobile cellular user

: Mobile ad hoc user (MT)

Page 18: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

18

• Idea: – Excessive traffic changes internal

characteristics inside a domain (high delay & loss, low throughput)

– Monitor network domain for unusual patterns

– If traffic is aggregating towards a domain (same IP prefix), probably an attack is coming

• Measure delay, link loss, and throughput achieved by user inside a network domain

• Study and analysis of detecting/ preventing attacks [Habib et al., Network and Distributed System Security Symposium (NDSS) ’03]

Example: Detecting service violation in Example: Detecting service violation in Internet by distributed monitoringInternet by distributed monitoring

Page 19: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

19

CoreCore--assisted loss measurementsassisted loss measurements• Core reports to the monitor whenever packet

drop exceeds a local threshold• Monitor computes the total drop for time

interval t • if the total drop exceeds a global threshold

a. The monitor sends a query to all edge routers requesting their current rates

b. The monitor computes total incoming rate from all edge

c. The monitor computes the loss ratio as the ratio of and the total incoming rate

d. If the loss ratio exceeds the SLA loss ratio, a possible SLA violation is reported

Page 20: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

20

EdgeEdge--toto--Edge (E2E) ApproachesEdge (E2E) Approaches• Stripe-based

– Back-to-back packets experience similar congestion in a queue with a high probability

– Receiver observes the incoming pattern– Infer internal characteristics using

topology

• Distributed (Overlay-based)– Edge routers form an overlay network for

probing– Each edge router probes part of the

network– Topology and probing reveal internal

characteristics

0

k

R R21

Page 21: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

Inferring LossInferring Loss• Calculate how many packets are

received by the two receivers. Transmission probability Ak

where Zi binary variable which takes 1 when all packets reached their destination and 0 otherwise

• Loss is 1 - Ak

• For general tree, send stripe from root to every order-pair of leaves.

ZR1 ZR2

ZR1 U R2Ak =

0

k

R R21

Page 22: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

22

StripeStripe--based Monitoringbased Monitoring [[HabibHabib et al., Journal of et al., Journal of

Computer CommunicationsComputer Communications ’03]’03]

The research correlates Edge to Edge measurements with internal behaviors. Send stripes from each edge router to every pair of edge routers

Can deal with different attacks such as

QoS agreement violation, DoS attacks, Bandwidth theft

Monitor the network for link delay

If delayi > SLAidelay for path i, then probe the network

for loss

If lossi > SLAiloss for any link i, then probe the network

for throughput

If BWi > SLAiBW, then flow i is violating SLA by taking

excess resources

Page 23: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

23

Probing StrategyProbing Strategy• Each ingress router copies the header of user

packets with probability to probe the network for delays

• The egress computes the edge-to-edge delay. If the delay exceeds a certain threshold, it reports delay along with the identity of both the ingress and egress routers to the monitor

• The monitor maintains the set of edge routers E' to send stripes, in order to infer loss on active links

• Monitor probes the network for throughput approximation only when the inferred loss is higher than the pre-configured threshold.

• Using delay, loss, and throughput approximations, the monitor can detect violations or bandwidth theft attacks

Page 24: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

24

OverlayOverlay--based monitoringbased monitoring

• E2E approach, i.e., infer internal characteristics from edge to edge measurements

• The probes are tunneled through the overlay network formed by the edge routers.

• Do not need individual link loss to identify all congested links

• Delay and throughput measurements are same as Stripe-based method

• Provide Simple and Advanced methods to identify congested links

Page 25: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

25

OverlayOverlay--based Probingbased Probing

• Each peer probes both of its neighbors

• Detect congested link in both directions

• Not all congested links can be correctly labeled

Page 26: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

26

False Positive (theoretical analysis)False Positive (theoretical analysis)

0

0.05

0.1

0.15

0.2

0.25

0 0.05 0.1 0.15 0.2 0.25 0.3

Fals

e po

sitiv

e (f

ract

ion

of li

nks)

Percentage of actual congested links

Topology 1

• The simple method does not correctly label all links• The unsolved “good” links are considered bad

hence false positive happens• Need to refine the solution Advanced Method

Page 27: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

27

• Example:if 100 links in the network and 20 of them are congested and 80 are “good”. The basic probing method can identify 15 congestion links and 70 good links. The other 15 are labeled as “unknown”. If all unknown links are treated as congested, 10 good link will be falsely labeled as congested. When the false positive is too high, the available paths that can be chosen by the routers are restricted, thus network performance is impacted.

Page 28: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

28

Performance of advanced method (theoretic analysis)Performance of advanced method (theoretic analysis)

Advanced method uses output of simple method and topology to find a probe that can be used to identify status of an unsolved link in simple method

Page 29: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

29

Dealing with service violationsDealing with service violations

• Identify misbehaving flows• Identify ingress routers through

which flows are entering into the domain

• Activate ingress filters at those ingress routers

• If it is not an attack, ignore it

Page 30: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

30

Experiment: Delay measurementsExperiment: Delay measurements

Delay under attackDelay under NO attack

Attack changes delay pattern in a network domain. The graph shows idle link delay, delay when no attack, and delay under attack

Page 31: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

31

Experiments: Loss measurementsExperiments: Loss measurements

Stripe-basedCore-assisted

Core-based measurement is more precise than stripe-based, however, it has high overhead

Page 32: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

32

Identified Congested Links (OverlayIdentified Congested Links (Overlay--based probing)based probing)

(a) Counter clockwise probing (b) Clockwise probing

Probe46 in graph (a) and Probe76 in graph (b) observe high losses, which means link C4 E6 is congested. Probes are among edge routers in the topology.

Page 33: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

33

Probing Probing DiffServDiffServ using Red, Yellow, and using Red, Yellow, and Green Drop precedence in StripeGreen Drop precedence in Stripe--based based MonitoringMonitoring

Page 34: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

34

Loss pattern during attack Loss pattern during attack (Generic)(Generic)

Attack changes loss pattern in a network domain

We need to know the loss pattern when there is not attack

Page 35: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

35

Bandwidth approximation (Generic)Bandwidth approximation (Generic)

Bandwidth approximation of some flows.

Page 36: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

36

Overhead comparison (theoretic analysis)Overhead comparison (theoretic analysis)

0 5 10 15 2010

2

103

104

105

Percentage of Misbehaving Flow

Pro

cess

ing

Ove

rhea

d (C

PU

cyc

les)

CoreStripeOverlay

0 5 10 15 2010

1

102

103

104

105

Percentage of Misbehaving Flow

Com

mun

icat

ion

Ove

rhea

d in

KB

ytes

CoreStripeOverlay

• Core has relative low processing overhead

• Distributed scheme has an edge over other two schemes

Page 37: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

37

Comparative EvaluationComparative Evaluation

Page 38: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

38

Monitoring evaluation observingMonitoring evaluation observing• Accuracy

–Flash crowd and popular sites might give false positive

• Effectiveness–Delay, link loss, and throughput can

effectively identify misbehaving flows

• Robustness (Future work)– If monitoring agents are not

compromised, the scheme works well

Page 39: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

39

Summary for Internet ResearchSummary for Internet Research• Monitoring can detect attack in early stage.

Filter can be used to stop the attacks• Overlay-based monitoring requires only O(n)

probing with a very high probability, where n is the number of edge routers

• Overlay-based monitoring can be used to monitor large scale overlay network

• Stripe-based inference is useful to annotate a topology tree with loss, delay, and bandwidth. Can be used in monitoring, high quality streaming

Page 40: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

40

Example: Intruder identification in Example: Intruder identification in mobile ad hoc networksmobile ad hoc networks

• Goals:• locate the source of attacks• safely combine the information from

multiple hosts and enable individual host to make independent decision

• achieve consistency among the conclusions of a group of hosts

Page 41: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

41

ArchitectureArchitecture

Datacollector

Global identificationagreement control

matching and

Identificationinformation

extracting

classifyand

Filter

Globalsharedinfo

Global ID

results

sharing

Global

data

Local IDengine

Local

engineidentification

blacklist

Localattacker

Global traffic traces

Local traffic traces

results

Global II

Page 42: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

42

Approach: Reverse Labeling Approach: Reverse Labeling RestrictionRestriction

• Detecting False Destination Sequence Attacks

• Establishing false route trees through reverse

labeling

• Establishing new routes by invalid packets

• Marking suspicious hosts and attackers

• Achieving consistent conclusions by quorum

voting

Page 43: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

43

Detecting false destination sequence attackDetecting false destination sequence attack

(1). S broadcasts a request that carries the old sequence + 1 = 21

(2) D receives the RREQ. Local sequence is 5, but the sequence in RREQ is 21. D detects the false desti-nation sequence attack.

DS3

RREQ(D, 21)RREQ(D, 21)

S S1

S2 M

S4

Propagation of RREQ

Page 44: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

44

Constructing false routing treesConstructing false routing trees

Source Malicious KMalicious 1

RLR creates suspicion trees. If a host is the root of a quorum of suspicion trees, it is labeled as the attacker.

Page 45: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

45

Establish routes to the destination hostEstablish routes to the destination host

• When the destination host sends out

INVALID packet with digital signature,

every host receiving this packet can

update its route to the destination host

through the path it gets the INVALID

packet.

Page 46: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

46

• Update Blacklist by INVALID Packet• Next hop on the invalid route will be

put into local blacklist, a timer starts, a counter ++

• Labeling process will be done in the reverse direction of route

• When timer expires, the suspicious host will be released from the blacklist and routing information from it will be accepted

• If counter > threshold, the suspicious host will be permanently put into blacklist

Page 47: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

47

• Update blacklist by quorum voting• Attach local blacklist to INVALID packet

with digital signature to prevent impersonation

• Every host will count the hosts involved in different routes that say a specific host is suspicious. If the number > threshold, it will be permanently added into local blacklist and identified as an attacker.

• Threshold can be dynamically changed or can be different on various hosts

Page 48: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

48

Evaluation parametersEvaluation parameters

• Accuracy• False coverage: Number of normal hosts

that are incorrectly marked as suspected. • False exclusion: Number of malicious hosts

that are not identified as such.

• Overhead • Overhead measures the increases in control

packets and computation costs for identifying the attackers (e.g. verifying signed packets, updating blacklists).

• Workload of identifying the malicious hosts in multiple rounds

Page 49: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

49

Evaluation parametersEvaluation parameters

• Effectiveness – Effectiveness: Increase in the performance

of ad hoc networks after the malicious hosts are identified and isolated. Metrics include the increase of the packet delivery ratio, the decrease of average delay, or the decrease of normalized protocol overhead (control packets/delivered packets).

• Robustness– Robustness of the algorithm: Its ability to

resist different kinds of attacks.

Page 50: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

50

Experiment resultsExperiment results

XX--axis is host pause time, which specifies the mobility pattern. axis is host pause time, which specifies the mobility pattern. YY--axis is delivery ratio. 25 connections and 50 connections are axis is delivery ratio. 25 connections and 50 connections are considered. RLR brings a 30% increase in delivery ratio. 100% considered. RLR brings a 30% increase in delivery ratio. 100% delivery is difficult to achieve due to network partition, routedelivery is difficult to achieve due to network partition, routediscovery delay and buffer.discovery delay and buffer.

40

50

60

70

80

90

100

0 10 20 30 40 50 60

Dat

a pa

cket

del

iver

y ra

tio

(%)

Host pause time (sec)

25 connections normal25 connections w/o RLR25 connections with RLR

50 connections normal50 connections w/o RLR50 connections with RLR

Page 51: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

51

20

30

40

50

60

70

80

90

100

0 1 2 3 4 5

Dat

a pa

cket

del

iver

y ra

tio (

%)

Number of malicious hosts

25 cons w/o RLR25 cons with RLR50 cons w/o RLR

50 cons with RLR

XX--axis is number of attackers. Yaxis is number of attackers. Y--axis is delivery ratio. axis is delivery ratio. 25 connections and 50 connections are considered. RLR 25 connections and 50 connections are considered. RLR brings a 20% to 30% increase in delivery ratio.brings a 20% to 30% increase in delivery ratio.

Page 52: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

52

1.0240.072460

1.1290.072450

0.62902440

1.12902830

1.12502420

1.42902510

2.2290.22240

# of normal hosts marked as malicious

# of normal hosts identify the attacker

# of normal hosts marked as malicious

# of normal hosts identify the attacker

Host Pause time (sec)

30 hosts, 50 connections30 hosts, 25 connections

The accuracy of RLR when there is only one The accuracy of RLR when there is only one attacker in the systemattacker in the system

Page 53: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

53

4.1190.67155

2.2250.62214

1.4271253

2.6280.65282

1.1290281

# of normal hosts marked as malicious

# of normal hosts identify all attackers

# of normal hosts marked as malicious

# of normal hosts identify all attackers

# of attackers

30 hosts, 50 connections30 hosts, 25 connections

The accuracy of RLR when there are multiple The accuracy of RLR when there are multiple attackersattackers

Page 54: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

54

0.4

0.5

0.6

0.7

0.8

0.9

1

1.1

1.2

1.3

1.4

1.5

0 10 20 30 40 50 60

Nor

mal

ize

over

head

(A

OD

V p

kt /

deliv

ery

pkt)

Host pause time (sec)

25 cons normal25 cons with RLR

50 cons normal50 cons with RLR

XX--axis is host pause time, which specifies the mobility axis is host pause time, which specifies the mobility pattern Ypattern Y--axis is normalized overhead (# of control axis is normalized overhead (# of control packet / # of delivered data packet). 25 connections packet / # of delivered data packet). 25 connections and 50 connections are considered. RLR increases the and 50 connections are considered. RLR increases the overhead slightly.overhead slightly.

Page 55: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

55

0

5

10

15

20

25

30

0 10 20 30 40 50 60

Num

ber

of s

igne

d pa

cket

s pr

oces

sed

by e

very

hos

t

Host pause time (sec)

25 connections50 connections

XX--axis is host pause time, which specifies the mobility axis is host pause time, which specifies the mobility pattern. Ypattern. Y--axis is the number of signed packets axis is the number of signed packets processed by every host. 25 connections and 50 processed by every host. 25 connections and 50 connections are considered. RLR does not severely connections are considered. RLR does not severely increase the computation overhead to mobile host.increase the computation overhead to mobile host.

Page 56: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

56

0

5

10

15

20

25

30

35

40

45

1 1.5 2 2.5 3 3.5 4 4.5 5

Num

ber

of s

igne

d pa

cket

s pr

oces

sed

by e

very

hos

t

Number of malicious hosts

25 connections50 connections

XX--axis is number of attackers. Yaxis is number of attackers. Y--axis is number of axis is number of signed packets processed by every host. 25 signed packets processed by every host. 25 connections and 50 connections are considered. RLR connections and 50 connections are considered. RLR does not severely increase the computation overhead does not severely increase the computation overhead of mobile host.of mobile host.

Page 57: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

57

Summary for ad hoc researchSummary for ad hoc research

• Establish quantitative criteria to evaluate intruder identification algorithms

• Present a distributed approach to defend false destination sequence attacks and locate the attackers

• The mechanism is robust to independent attackers

• The threshold value determines its robustness to gang attacks

Page 58: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

58

Example: Fault tolerant authentication in Example: Fault tolerant authentication in movable base station systemmovable base station system

Mobile Computing Environment are:

– Vulnerable to failures, intrusion, and eavesdropping.

– Adhoc mobile systems has everything moving (hosts, base-stations, routers/agents, subnets, intranet).

– Need survivability from intentional and unintentional attacks.

Page 59: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

59

Research IdeasResearch Ideas• Integrate ideas from Science and Engineering of

security and fault-tolerance.Examples:• Need to provide access to information during

failures ↔ need to disallow access for unauthorized users.

– Duplicate routers & functions, duplicate authentication functions, duplicate secrete session key database, secure database that provides public keys.

– Auditing, logging, check-pointing, monitoring, intrusion detection, denial of service.

• Adaptability:– Adapt to timing, duration, severity, type of attack.

• Election Protocols – selection of back-up base station.

Page 60: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

60

Objective

• To provide uninterrupted secure service to the mobile hosts when base station moves or fails.

Research focus

• Fault-tolerant Authentication

• Group Key Management

• Adaptable, Re-configurable Software

• Experiments

Page 61: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

61

Fundamental Security ServicesFundamental Security Services

• Authentication–Provides assurance of a host’s

identity.–Provides a means to counter

masquerade and replay attacks.–Can be applied to several aspects

of multicast (ex: registration process).

Page 62: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

62

ProblemProblem DescriptionDescription

• To ensure security and theft of resources (like bandwidth), all the packets originating inside the network should be authenticated.

• Typically, a Mobile Host sends a packet to its Home Agent along with the authentication information.

Page 63: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

63

Problem Description (continued)Problem Description (continued)• If the Authentication is successful,

Home Agent forwards the packet. Otherwise, packet is dropped.

Internet

Authentication andForwarding Services

Home Agent

Mobile cellular user

Page 64: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

64

ProxyProxy--Based SolutionBased Solution

Source cell

Destination cellBS1

Arbitrary NetworkArbitrary Network

Foreign Network

BS

Page 65: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

65

Proposed SchemesProposed Schemes

• We propose two schemes to solve the problem.

– Virtual Home Agent– Hierarchical Authentication

• They differ in the architecture and the responsibilities that the Mobile Hosts and Base Stations (Agents) hold.

Page 66: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

66

Virtual Home Agent SchemeVirtual Home Agent SchemeVHA ID = IP ADDRESSMaster Home Agent (MHA) Database Server

Shared SecretsDatabase

Backup Home Agents Other hosts in the network

Page 67: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

67

Advantages of the Proposed SchemeAdvantages of the Proposed Scheme

• Has only 3 states and hence the overhead of state maintenance is negligible.

• Very few tasks need to be performed in each state (outlined in the tech report).

• Flexible – there could be multiple VHAs in the same LAN and a MHA could be a BHA for another VHA, a BHA could be a BHA for more than one VHA at the same time. [Bhargava et al, International Conference on Internet Computing, 00]

Page 68: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

68

Disadvantages of Virtual HA SolutionDisadvantages of Virtual HA Solution

• Not scalable if every packet has to be authenticated–Ex: huge audio or video data

• BHA (Backup Home Agents) are idle most of the time (they just listen to MHA’s advertisements.

• Central Database is still a single point of failure.

Page 69: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

69

Hierarchical Authentication SchemeHierarchical Authentication Scheme

• Multiple Home Agents in a LAN are organized in a hierarchy (like a tree data structure).

• A Mobile Host shares a key with each of the Agents above it in the tree (Multiple Keys).

• At any time, highest priority key is used for sending packets or obtaining any other kind of service.

Page 70: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

70

Hierarchical Authentication SchemeHierarchical Authentication Scheme

A

CB

GFED

K2

K1

(K1, P1)(K2, P2)

Database

Database

Page 71: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

71

Hierarchical Authentication SchemeHierarchical Authentication Scheme

Key Priority depends on several factors and computed as cumulative sum of weighted priorities of each factors:

Example Factors:• Communication Delays• Processing Speed of the Agents• Key Usage• Life Time of the Key

Page 72: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

72

Clusters to Achieve Scalable Fault Clusters to Achieve Scalable Fault Tolerant AuthenticationTolerant Authentication

• Front-End is the MHA.• Back-Ends are BHAs.• Each packet is digitally signed by

the Mobile Host.• Packets are forwarded to the MHA.• Back-Ends verify the signatures.

Page 73: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

73

Example: Cellular Aided Mobile Ad Example: Cellular Aided Mobile Ad hoc (CAMA) Network (In progress)hoc (CAMA) Network (In progress)

• Goal:– Integrating Ad hoc networks with

current cellular system and building a topology that has advantages from both architectures

–Overcome the traditional security weakness in ad hoc networks caused by lack of central control and slow information distribution

Page 74: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

74

Advantages• Reliable information distribution

- Information for intrusion detection need not go through un-known intermediate hosts

• Fast information distribution- One hop uplink and downlink cellular

channel takes place of multi-hop ad hoc channel

• Global positioning routing- Robustness of positioning routing can prevent Ad hoc network from attacks on routing discovery

Page 75: Detecting service violation in Internet and Mobile ad …...Detecting service violation in Internet and mobile ad hoc networks Bharat Bhargava CERIAS security center and Department

75

ConclusionConclusion• Service violation exists in all networks

and puts severe threats to network security and performance

• Distributed monitoring and joint response among entities in the networks are essential to the detection of service violation

• Designed mechanisms must provide assurance on accuracy and efficiency of detection