크로스 층에서의 MANET을 이용한 IDS

An IDS in MANET with Cross Layer Concept

  • 김상언 (조선대학교 정보통신공학과) ;
  • 한승조 (조선대학교 정보통신공학과)
  • Kim, Sang-Eun (Dept. of Information and Communication Engineering, Chosun University) ;
  • Han, Seung-Jo (Dept. of Information and Communication Engineering, Chosun University)
  • 투고 : 2009.12.23
  • 심사 : 2010.02.28
  • 발행 : 2010.02.28

초록

침입 탐지는 인터넷 보안에 반드시 필요한 구성 요소이다. 발전하고 있는 추세에 뒤지지 않고 따라가기 위해 싱글 레이어 탐지 기술을 멀티 레이어 탐지 기술에 적용 할 수 있는 방법이 필요하다. 다른 타입의 서비스 거부 공격(DoS)은 인가된 사용자의 네트워크 접근을 방해하므로 서비스 거부 공격의 취약한 점을 찾아 피해를 최소화 하기위해 노력했다. 우리는 악의적인 노드를 발견하기 위한 새로운 크로스 레이어 침입 탐지 아키텍처를 제안한다. 프로토콜 스텍에서 서로 다른 레이어를 가로지를 수 있는 정보는 탐색의 정확성을 향상시키기 위하여 제안하였다. 제안한 프로토콜의 아키텍처를 강화하기 위해 데어터 마이닝을 사용하여 조합과 분배의 변칙적인 침입탐지 시스템을 사용했다. 제안하고 있는 구조의 시뮬레이션은 OPNET 시뮬레이터를 사용하여 결과 분석을 하였다.

Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.

키워드

참고문헌

  1. Thamilarasu, G., et al. "A cross-layer based intrusion detection approach for wireless ad hoc networks", Mobile Ad hoc and Sensor Systems Conference, 2005. IEEE International Conference on 2005
  2. C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "Cross Layer versus Single Layer Approaches for Intrusion Detection in MANET", IEEE International Conference on Networks 2007 (ICON 2007), Nov 2007
  3. J. S. Baras and S. Radosavac, "Attacks and Defenses Utilizing Cross-Layer Interactions in MANET" , Workshop on Cross-Layer Issues in theDesign of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management, June 2–3, 2004, Naval Research Laboratory, Washington, DC
  4. Y. Liu, Y. Li, and H. Man, "Short paper: A distributed cross-layer intrusion detection system for ad hoc networks", In Proc. IEEE/Create Net the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pages 418-420, September 2005
  5. C. J. John Felix, A. Das, B.-C. Seet, and B.-S. Lee, "CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs", IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, CA, USA, March 2008.
  6. C. Loo, M. Ng, C. Leckie and M. Palaniswami. Intrusion Detection for Routing attacks in Sensor Networks. In International Journal of Distributed Sensor Networks, october-December 2006,2(4): 313-332 https://doi.org/10.1080/15501320600692044
  7. Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer (2002) and J. Oldmeadow, S. Ravinutala and C. Leckie, "Adaptive Clustering for Network Intrusion Detection."In Proceedings of the Third International Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2004), May 2004, pp. 255-259
  8. OPNET modeler, http://www.opnet.com/
  9. T. Phit and K. Abe, "Protocol Specification-based Intrusion Detection System for VoIP," Technical Report of IEICE, 2008