Intrusion Detection in Wireless Ad-Hoc Networks
Total Page:16
File Type:pdf, Size:1020Kb
Intrusion Detection in Wireless Ad-Hoc Networks Yongguang Zhang Wenke Lee HRL Laboratories, LLC Department of Computer Science Malibu, CA 90265 North Carolina State University [email protected] Raleigh, NC 27695 wenke @csc.ncsu.edu ABSTRACT fixed wired network. Applications of ad-hoc networks range As the recent denial-of-service attacks on several major In- from military tactical operations to civil rapid deployment ternet sites have shown us, no open computer network is such as emergency search-and-rescue missions, data collec- immune from intrusions. The wireless ad-hoc network is tion/sensor networks, and instantaneous classroom/meeting particularly vulnerable due to its features of open medium, room applications. dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of The nature of wireless ad-hoc networks makes them very a clear line of defense. Many of the intrusion detection tech- vulnerable to an adversary's malicious attacks. First of all, niques developed on a fixed wired network are not applicable the use of wireless links renders a wireless ad-hoc network in this new environment. How to do it differently and ef- susceptible to attacks ranging from passive eavesdropping to fectively is a challenging research problem. In this paper, active interfering. Unlike wired networks where an adver- we first examine the vulnerabilities of a wireless ad-hoc net- sary must gain physical access to the network wires or pass work, the reason why we need intrusion detection, and the through several lines of defense at firewalls and gateways, reason why the current methods cannot be applied directly. attacks on a wireless ad-hoc network can come from all di- We then describe the new intrusion detection and response rections and target at any node. Damages can include leak- mechanisms that we are developing for wireless ad-hoc net- ing secret information, message contamination, and node works. impersonation. All these mean that a wireless ad-hoc net- work will not have a clear line of defense, and every node 1. INTRODUCTION must be prepared for encounters with an adversary directly A wireless ad-hoc network consists of a collection of "peer" or indirectly. mobile nodes that are capable of communicating with each other without help from a fixed infrastructure. The inter- Second, mobile nodes axe autonomous units that are capa- connections between nodes are capable of changing on a con- ble of roaming independently. This means that nodes with tinual and arbitrary basis. Nodes within each other's radio inadequate physical protection are receptive to being cap- range communicate directly via wireless links, while those tured, compromised, and hijacked. Since tracking down a that are far apart use other nodes as relays. Nodes usually particular mobile node in a large scale ad-hoc network can- share the same physical media; they transmit and acquire not be done easily, attacks by a compromised node from signals at the same frequency band, and follow the same within the network are far more damaging and much harder hopping sequence or spreading code. The data-link-layer to detect. Therefore, any node in a wireless ad-hoc network functions manage the wireless link resources and coordinate must be prepared to operate in a mode that trusts no peer. medium access among neighboring nodes. The medium ac- cess control (MAC) protocol is essential to a wireless ad-hoc Third, decision-making in ad-hoc networks is usually decen- network because it allows mobile nodes to share a common tralized and many ad-hoc network algorithms rely on the broadcast channel. The network-layer functions maintain cooperative participation of all nodes. The lack of central- the multi-hop communication paths across the network; all ized authority means that the adversaries can exploit this nodes must function as routers that discover and maintain vulnerability for new types of attacks designed to break the routes to other nodes in the network. Mobility and volatil- cooperative algorithms. ity are hidden from the applications so that any node can communicate with any other node as if everyone were in a For example, the current MAC protocols for wireless ad- hoc networks are all vulnerable. Although there are many Permission to make digital or hard copies of all or part of this work for MAC protocols, the basic working principles are similar. In personal or classroom use is granted without fee provided that copies a contention-based method, each node must compete for are not made or distributed fbr profit or commercial advantage and that control of the transmission channel each time it sends a mes- copies bear this notice and the full citation on the first page. To copy sage. Nodes must strictly follow the pre-defined procedure otherwise, to republish, to post on servers or to redistribute to lists, to avoid collisions or to recover from them. In a contention- requires prior specific permission and/or a fee. MOBICOM 2000 Boston MA USA free method, each node must seek from all other nodes a Copyright ACM 2000 1-58113-197-6/00/08...$5.00 unanimous promise of an exclusive use of the channel re- source, on a one-time or recurring basis. Regardless of the 275 type of MAC protocol, if a node behaves maliciously, the neered" penetration techniques (as illustrated in the recent MAC protocol can break down in a scenario resembling a "I Love You" virus). For example, even though they were denial-of-service attack. Although such attacks are rare in first reported many years ago, exploitable "buffer overflow" wired networks because the physical networks and the MAC security holes, which can lead to an unauthorized root shell, layer are isolated from the outside world by layer-3 gate- still exist in some recent system softwares. Furthermore, as ways/firewalls, every mobile node is completely vulnerable illustrated by recent Distributed Denial-of-Services (DDOS) in the wireless open medium. attacks launched against several major Internet sites where security measures were in place, the protocols and systems Ad-hoc routing presents another vulnerability. Most ad-hoc that are designed to provide services (to the public) are in- routing protocols are also cooperative in nature[14]. Un- herently subject to attacks such as DDOS. Intrusion detec- like with a wired network, where extra protection can be tion can be used as a second wall to protect network systems placed on routers and gateways, an adversary who hijacks because once an intrusion is detected, e.g., in the early stage an ad-hoc node could paralyze the entire wireless network by of a DDOS attack, response can be put into place to min- disseminating false routing information. Worse, such false imize damages, gather evidence for prosecution, and even routing information could result in messages from all nodes launch counter-attacks. being fed to the compromised node. The primary assumptions of intrusion detection are: user Intrusion prevention measures, such as encryption and au- and program activities are observable, for example via sys- thentication, can be used in ad-hoc networks to reduce intru- tem auditing mechanisms; and more importantly, normal sions, but cannot eliminate them. For example, encryption and intrusion activities have distinct behavior. Intrusion and authentication cannot defend against compromised mo- detection therefore involves capturing audit data and rea- bile nodes, which carry the private keys. Integrity validation soning about the evidence in the data to determine whether using redundant information (from different nodes), such as the system is under attack. Based on the type of audit those being used in secure routing [16, 17], also relies on data used, intrusion detection systems (IDSs) can be cate- the trustworthiness of other nodes, which could likewise be gorized as network-based or host-based. A network-based a weak link for sophisticated attacks. IDS normally runs at the gateway of a network and "cap- tures" and examines network packets that go through the The history of security research has taught us a valuable les- network hardware interface. A host-based IDS relies on op- son - no matter how many intrusion prevention measures are erating system audit data to monitor and analyze the events inserted in a network, there are always some weak links that generated by programs or users on the host. Intrusion de- one could exploit to break in. Intrusion detection presents tection techniques can be categorized into misuse detection a second wall of defense and it is a necessity in any high- and anomaly detection. survivability network. Misuse detection systems, e.g., IDIOT [8] and STAT [5], In summary, a wireless ad-hoc network has inherent vulner- use patterns of well-known attacks or weak spots of the sys- abilities that are not easily preventable. To build a highly tem to match and identify known intrusions. For example, secure wireless ad-hoc network, we need to deploy intrusion a signature rule for the "guessing password attack" can be detection and response techniques, and further research is "there are more than 4 failed login attempts within 2 min- necessary to adapt these techniques to this new environ- utes". The main advantage of misuse detection is that it can ment, from their original applications in fixed wired network. accurately and efficiently detect instances of known attacks. In this paper, we propose our new model for intrusion de- The main disadvantage is that it lacks the ability to detect tection and response in mobile, ad-hoc wireless networks. the truly innovative (i.e., newly invented) attacks. We are currently investigating the use of cooperative statis- tical anomaly detection models for protection from attacks Anomaly detection systems, for example, IDES [12], flag on ad-hoc routing protocols, on wireless MAC protocols, or observed activities that deviate significantly from the es- on wireless applications and services.