SlideShare a Scribd company logo
Enhanced Adaptive Acknowledgement[EAACK] -
A Secure Intrusion Detection Sysytem for MANETs
Akshaya Arunan
Guided By: Mrs Vrinda
Assistant Proffessor
MKALEIT041
February 12, 2015
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
OUTLINE
1 OBJECTIVE
2 INTRODUCTION
Mobile Ad Hoc Networks(MANET)[3]
Attacks
3 LITERATURE SURVEY
4 PROPOSED SYSTEM
5 SCHEME DECRIPTION
6 CONCLUSION
7 REFERENCE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
OBJECTIVE
EAACK demonstrates higher malicious behavior detection rates in certain
circumstances while does not greatly affect the network performances.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
INTRODUCTION
Most used networks - Wireless Local Area Network (WLAN).
A set of mobile nodes are connected to a fixed wired backbone.
Short range
Risky
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
Mobile Ad Hoc Networks[3]
Self-configuring.
Infrastructure-less network - without wires.
Each device is free to move independently in any direction
Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to
communicate with roadside equipment.
Disadvantage - More vulnerable to attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
Atacks
Denial of service.
Eavesdropping.
Spoofing.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
Figure : MANET
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
LITERATURE SURVEY
WATCHDOG[4]
TWOACK[5]
AACK[7]
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
WATCHDOG[4]
Aim: To improve throughput of network with the presence of malicious
nodes.
Consists of two parts:
Watchdog
Pathrater
Detection - Promiscuously listens to its next hops transmission.
If overhears that its next node failed - increases its failure counter.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
Watchdog Limitations
Three problems of Watchdog scheme, namely:
Receiver collision
Limited transmission power
False misbehavior
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : RECIEVER COLLISION: Both node B and node X are trying to send
packet 2 to node c at the same time
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission
power so that the packet transmission can be overheard by node A but too weak
to reach node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour
report even though node B forwarded the packet to node C
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
TWOACK[5]
Aim: To resolve the receiver collision and limited transmission power
problems of Watchdog
TWOACK detects misbehaving links by
Acknowledging every data packets.
From the source to the destination.
Upon retrieval of a packet
Sends back an acknowledgement packet
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
Figure : TWOACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
AACK[7]
Similar to TWOACK, AACK is an acknowledgement based network layer
scheme.
ACK (identical to TWOACK) + End-to-End acknowledgement scheme
called ACK.
Reduces network overhead.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
PROPOSED SYSTEM - EAACK[1]
Steps:
LOCAL INTEGRATION
GLOBAL INTEGRATION
HOME AGENT
CLASSIFIER
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
Description
LOCAL INTEGRATION: Self system and finds out the local anomaly
attacks.
GLOBAL INTEGRATION: Finds the intrusion result for entire network.
HOME AGENT: Gathers information about its system from application
layer to routing layer.
CLASSIFIER: The Home Agent calls the classifier construction to find out
the attacks.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
Figure : PROPOSED SYSTEM ARCHITECTURE
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
SCHEME DESCRIPTION
EAACK consists of three major parts, namely:
Acknowledge (ACK)
Secure-Acknowledge (S-ACK)
Misbehaviour Report Authentication (MRA)
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
Figure : FLOW CHART OF EAACK
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
CONCLUSION
A comparative study of Secure Intrusion Detection Systems (SIDS) for
discovering malicious nodes and attacks on MANETs is presented.
Prevention mechanisms alone are not adequate to manage the secure
networks.
Thus, detection should be focused as another part before an attacker can
damage the structure of the system.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
REFERENCE
[1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System
for MANETs” - International Journal of Latest Trends and Technology in
Engineering, 2013.
[2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network
Security” - Springer, 2012.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
[3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc
Wireless Networks” - Mobile Computing, Kluwer Academic Publishers,
1996.
[4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving
Nodes in MANETs” - The 12th International Conference on Information
Integration and Web-based Applications Services, 2010.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
[5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged
Acknowledgements in MANETs” - The 25th International Conference on
Advanced Information Networking and Applications, 2011.
[6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a
Distributed Wireless Sensor Network”- IEEE Transactions on
Instrumentation and Measurement, 2008.
[7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for
Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and
Wireless Conference, 2003.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
THANK YOU.
Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19

More Related Content

PPTX
Classification of Systems - Additional Solved Problems
PDF
Syntax directed translation
DOCX
Eaack—a secure intrusion detection system for mane ts
PDF
Intermediate code generation
PDF
Compilers Design
PDF
Operator precedence
PDF
Syntax analysis
PPTX
Syntax directed-translation
Classification of Systems - Additional Solved Problems
Syntax directed translation
Eaack—a secure intrusion detection system for mane ts
Intermediate code generation
Compilers Design
Operator precedence
Syntax analysis
Syntax directed-translation

Similar to Akshayappt (20)

PDF
Intrusion detection system for manets a secure eaack
PDF
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
PPTX
Eaack—a secure intrusion detection.ppt
PPT
eaack-a secure ids for manet
DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
PDF
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
DOCX
Eaack—a secure intrusion detection system for manets ns2
DOCX
Eaack—a secure intrusion detection system for manets
PDF
Secured Intrusion Protection System through EAACK in MANETS
PPTX
Intrusion detection in MANETS
PPTX
EAACK-A Secure Intrusion Detection System Overview
PPTX
Enhanced Adaptive ACKnowledgment (EAACK)
PDF
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
PDF
Iaetsd baack better adaptive
PDF
Adopting hybrid cryptography technique for reduction of network overhead in m...
PDF
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
PDF
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
PDF
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network
PDF
Eaack—a secure intrusion detection system for mane ts
PDF
Dotnet eaack—a secure intrusion-detection system for mane ts
Intrusion detection system for manets a secure eaack
Performance Enhancement of Intrusion Detection System Using Advance Adaptive ...
Eaack—a secure intrusion detection.ppt
eaack-a secure ids for manet
JAVA 2013 IEEE NETWORKSECURITY PROJECT Eaack—a secure intrusion detection sys...
Seamless and Secured wide Fidelity enhancement in moving vehicles Using Eeack...
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets
Secured Intrusion Protection System through EAACK in MANETS
Intrusion detection in MANETS
EAACK-A Secure Intrusion Detection System Overview
Enhanced Adaptive ACKnowledgment (EAACK)
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...
Iaetsd baack better adaptive
Adopting hybrid cryptography technique for reduction of network overhead in m...
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
SELECTIVE WATCHDOG TECHNIQUE FOR INTRUSION DETECTION IN MOBILE AD-HOC NETWORK
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network
Eaack—a secure intrusion detection system for mane ts
Dotnet eaack—a secure intrusion-detection system for mane ts
Ad

Akshayappt

  • 1. Enhanced Adaptive Acknowledgement[EAACK] - A Secure Intrusion Detection Sysytem for MANETs Akshaya Arunan Guided By: Mrs Vrinda Assistant Proffessor MKALEIT041 February 12, 2015 Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 1 / 19
  • 2. OUTLINE 1 OBJECTIVE 2 INTRODUCTION Mobile Ad Hoc Networks(MANET)[3] Attacks 3 LITERATURE SURVEY 4 PROPOSED SYSTEM 5 SCHEME DECRIPTION 6 CONCLUSION 7 REFERENCE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 2 / 19
  • 3. OBJECTIVE EAACK demonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the network performances. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 3 / 19
  • 4. INTRODUCTION Most used networks - Wireless Local Area Network (WLAN). A set of mobile nodes are connected to a fixed wired backbone. Short range Risky Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 4 / 19
  • 5. Mobile Ad Hoc Networks[3] Self-configuring. Infrastructure-less network - without wires. Each device is free to move independently in any direction Example - A VANET (Vehicular Ad Hoc Network)- Allows vehicles to communicate with roadside equipment. Disadvantage - More vulnerable to attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 5 / 19
  • 6. Atacks Denial of service. Eavesdropping. Spoofing. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 6 / 19
  • 7. Figure : MANET Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 8. LITERATURE SURVEY WATCHDOG[4] TWOACK[5] AACK[7] Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 7 / 19
  • 9. WATCHDOG[4] Aim: To improve throughput of network with the presence of malicious nodes. Consists of two parts: Watchdog Pathrater Detection - Promiscuously listens to its next hops transmission. If overhears that its next node failed - increases its failure counter. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 8 / 19
  • 10. Watchdog Limitations Three problems of Watchdog scheme, namely: Receiver collision Limited transmission power False misbehavior Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 11. Figure : RECIEVER COLLISION: Both node B and node X are trying to send packet 2 to node c at the same time Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 12. Figure : LIMITED TRANSMISSION POWER: Node B limits its transmission power so that the packet transmission can be overheard by node A but too weak to reach node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 9 / 19
  • 13. Figure : FALSE MISBEHAVIOUR REPORT: Node A sends back misbehaviour report even though node B forwarded the packet to node C Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 14. TWOACK[5] Aim: To resolve the receiver collision and limited transmission power problems of Watchdog TWOACK detects misbehaving links by Acknowledging every data packets. From the source to the destination. Upon retrieval of a packet Sends back an acknowledgement packet Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 10 / 19
  • 15. Figure : TWOACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 16. AACK[7] Similar to TWOACK, AACK is an acknowledgement based network layer scheme. ACK (identical to TWOACK) + End-to-End acknowledgement scheme called ACK. Reduces network overhead. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 11 / 19
  • 17. PROPOSED SYSTEM - EAACK[1] Steps: LOCAL INTEGRATION GLOBAL INTEGRATION HOME AGENT CLASSIFIER Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 12 / 19
  • 18. Description LOCAL INTEGRATION: Self system and finds out the local anomaly attacks. GLOBAL INTEGRATION: Finds the intrusion result for entire network. HOME AGENT: Gathers information about its system from application layer to routing layer. CLASSIFIER: The Home Agent calls the classifier construction to find out the attacks. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 13 / 19
  • 19. Figure : PROPOSED SYSTEM ARCHITECTURE Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 20. SCHEME DESCRIPTION EAACK consists of three major parts, namely: Acknowledge (ACK) Secure-Acknowledge (S-ACK) Misbehaviour Report Authentication (MRA) Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 14 / 19
  • 21. Figure : FLOW CHART OF EAACK Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 22. CONCLUSION A comparative study of Secure Intrusion Detection Systems (SIDS) for discovering malicious nodes and attacks on MANETs is presented. Prevention mechanisms alone are not adequate to manage the secure networks. Thus, detection should be focused as another part before an attacker can damage the structure of the system. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 15 / 19
  • 23. REFERENCE [1] Elhadi M. Shakshuki - ”EAACK A Secure Intrusion Detection System for MANETs” - International Journal of Latest Trends and Technology in Engineering, 2013. [2] R. Akbani, T. Korkmaz and G.V.S Raju - ”Mobile Ad hoc Network Security” - Springer, 2012. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 16 / 19
  • 24. [3] D. Johnson and D. Maltz. - ”Dynamic Source Routing in Ad hoc Wireless Networks” - Mobile Computing, Kluwer Academic Publishers, 1996. [4] N. Kang, E. Shakshuki and T. Sheltami. - ”Detecting Misbehaving Nodes in MANETs” - The 12th International Conference on Information Integration and Web-based Applications Services, 2010. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 17 / 19
  • 25. [5] N. Kang, E. Shakshuki and T. Sheltami - ”Detecting Forged Acknowledgements in MANETs” - The 25th International Conference on Advanced Information Networking and Applications, 2011. [6] Y. Kim - ”Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network”- IEEE Transactions on Instrumentation and Measurement, 2008. [7]A. Patcha and A. Mishra - ”Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks” - Radio and Wireless Conference, 2003. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 18 / 19
  • 26. THANK YOU. Akshaya ArunanGuided By: Mrs VrindaAssistant Proffessor (MES College of Engineering)EAACK February 12, 2015 19 / 19