Title :
Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks
Author :
Cabrera, João B D ; Gutiérrez, Carlos ; Mehra, Raman K.
Author_Institution :
Sci. Syst. Co., Inc., Woburn, MA
Abstract :
This paper addresses one aspect of the problem of defending mobile ad-hoc networks (MANETs) against computer attacks, namely, the development of a distributed anomaly-based intrusion detection system. In a general sense, the proposed system is a co-located sensor network, in which the monitored variable is the health of the network being monitored. A three level hierarchical system for data collection, processing and transmission is described. Local IDSs (intrusion detection systems) are attached to each node of the MANET, collecting raw data of network operation, and computing a local anomaly index measuring the difference between the current node operation and a baseline of normal operation. Anomaly indexes from nodes belonging to a cluster are periodically transmitted to a cluster head, which fuses the node indexes producing a cluster-level anomaly index. Likewise, cluster heads periodically transmit these cluster-level anomaly indexes to a manager node, which fuses the cluster-level indexes into a network-level anomaly index. Due to network mobility, cluster membership and cluster heads are time varying. The paper describes: (1) clustering algorithms to update cluster centers; (2) machine learning algorithms for computing the local anomaly indexes; (3) a statistical scheme for fusing the anomaly indexes at the cluster heads and at the manager. The statistical scheme is formally shown to increase detection accuracy under idealized assumptions. These algorithms were implemented and tested under the following conditions. Routing schemes: AODV (ad-hoc on demand distance vector routing) and OLSR (optimized link state routing); mobility patterns: random walk mobility model and reference point group mobility at various speeds; types of attacks: traffic flooding denial-of-service and black hole. For performance evaluation we determined the ROC (receiver operating characteristics) for various operational conditions at the nodes, cluster heads and manager. The overall res- - ults confirm the effectiveness of the infrastructures and algorithms described in the paper, with detection accuracy generally improving as we move up in the hierarchy, i.e. detection accuracy at the cluster level is higher than at local level, while network-level detection outperforms cluster-level detection
Keywords :
ad hoc networks; learning (artificial intelligence); mobile radio; pattern clustering; security of data; statistical analysis; telecommunication network routing; telecommunication security; telecommunication services; wireless sensor networks; (optimized link state routing; MANET; ad-hoc on demand distance vector routing; black hole; cluster head; cluster membership; cluster-level anomaly index; colocated sensor network; computer attacks; data collection; data processing; data transmission; distributed anomaly; intrusion detection; local anomaly indexes; machine learning algorithms; mobile ad-hoc networks; mobility patterns; network mobility; random walk mobility model; receiver operating characteristics; reference point group mobility; statistical scheme; three level hierarchical system; traffic flooding denial-of-service; Ad hoc networks; Clustering algorithms; Computer networks; Computerized monitoring; Fuses; Intrusion detection; Machine learning algorithms; Magnetic heads; Mobile computing; Routing;
Conference_Titel :
Military Communications Conference, 2005. MILCOM 2005. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-9393-7
DOI :
10.1109/MILCOM.2005.1605939